UbiRoad--- Semantic Middleware for Cooperative Traffic Systems and Services
随机分形搜索算法
随机分形搜索算法葛钱星;马良;刘勇【摘要】现有的元启发式算法大多是模仿生物的群体运动来解决优化问题.为了进一步给优化算法的设计提供新的思路,受自然生长现象的启发,提出了一种新型的元启发式算法—随机分形搜索算法.该算法利用分形的扩散特性进行寻优,其优化原理完全不同于现有的元启发式算法.其中,算法的扩散过程采用高斯随机游走方式来开发问题的搜索空间,而更新过程则分别对个体的分量及个体本身采用相应的更新策略来进行更新,以此进行全局搜索和局部搜索,从而形成了一个完整的优化系统.通过对一系列典型的测试函数优化问题的求解实验并与其他算法进行比较,结果表明随机分形搜索算法不仅具有较高的计算精度,而且具有较快的收敛速度.【期刊名称】《计算机技术与发展》【年(卷),期】2019(029)004【总页数】6页(P1-6)【关键词】随机分形;随机分形搜索算法;扩散;更新;最优化【作者】葛钱星;马良;刘勇【作者单位】上海理工大学,上海 200093;上海理工大学,上海 200093;上海理工大学,上海 200093【正文语种】中文【中图分类】TP301.60 引言近年来,元启发式算法取得了巨大的发展,出现了许多有代表性的方法。
例如,遗传算法(genetic algorithm,GA)是基于生物进化论中“自然选择、适者生存”规律而提出的优化方法;粒子群优化算法(particle swarm optimization,PSO)是基于鸟群觅食行为规律而提出的群体智能优化方法[1];人工蜂群算法(artificial bee colony,ABC)是基于蜜蜂群觅食行为特性而提出的优化方法[2];蚁群算法(ant colony,AC)是基于蚁群在觅食过程中的行为特性而提出的仿生类算法[3];引力搜索算法(gravitational search,GSA)是基于万有引力定律而提出的智能优化算法[4-5];布谷鸟搜索算法(cuckoo search,CS)是基于布谷鸟的寄生育雏的行为特性而提出的元启发式算法[6-7]。
人工智能领域中英文专有名词汇总
名词解释中英文对比<using_information_sources> social networks 社会网络abductive reasoning 溯因推理action recognition(行为识别)active learning(主动学习)adaptive systems 自适应系统adverse drugs reactions(药物不良反应)algorithm design and analysis(算法设计与分析) algorithm(算法)artificial intelligence 人工智能association rule(关联规则)attribute value taxonomy 属性分类规范automomous agent 自动代理automomous systems 自动系统background knowledge 背景知识bayes methods(贝叶斯方法)bayesian inference(贝叶斯推断)bayesian methods(bayes 方法)belief propagation(置信传播)better understanding 内涵理解big data 大数据big data(大数据)biological network(生物网络)biological sciences(生物科学)biomedical domain 生物医学领域biomedical research(生物医学研究)biomedical text(生物医学文本)boltzmann machine(玻尔兹曼机)bootstrapping method 拔靴法case based reasoning 实例推理causual models 因果模型citation matching (引文匹配)classification (分类)classification algorithms(分类算法)clistering algorithms 聚类算法cloud computing(云计算)cluster-based retrieval (聚类检索)clustering (聚类)clustering algorithms(聚类算法)clustering 聚类cognitive science 认知科学collaborative filtering (协同过滤)collaborative filtering(协同过滤)collabrative ontology development 联合本体开发collabrative ontology engineering 联合本体工程commonsense knowledge 常识communication networks(通讯网络)community detection(社区发现)complex data(复杂数据)complex dynamical networks(复杂动态网络)complex network(复杂网络)complex network(复杂网络)computational biology 计算生物学computational biology(计算生物学)computational complexity(计算复杂性) computational intelligence 智能计算computational modeling(计算模型)computer animation(计算机动画)computer networks(计算机网络)computer science 计算机科学concept clustering 概念聚类concept formation 概念形成concept learning 概念学习concept map 概念图concept model 概念模型concept modelling 概念模型conceptual model 概念模型conditional random field(条件随机场模型) conjunctive quries 合取查询constrained least squares (约束最小二乘) convex programming(凸规划)convolutional neural networks(卷积神经网络) customer relationship management(客户关系管理) data analysis(数据分析)data analysis(数据分析)data center(数据中心)data clustering (数据聚类)data compression(数据压缩)data envelopment analysis (数据包络分析)data fusion 数据融合data generation(数据生成)data handling(数据处理)data hierarchy (数据层次)data integration(数据整合)data integrity 数据完整性data intensive computing(数据密集型计算)data management 数据管理data management(数据管理)data management(数据管理)data miningdata mining 数据挖掘data model 数据模型data models(数据模型)data partitioning 数据划分data point(数据点)data privacy(数据隐私)data security(数据安全)data stream(数据流)data streams(数据流)data structure( 数据结构)data structure(数据结构)data visualisation(数据可视化)data visualization 数据可视化data visualization(数据可视化)data warehouse(数据仓库)data warehouses(数据仓库)data warehousing(数据仓库)database management systems(数据库管理系统)database management(数据库管理)date interlinking 日期互联date linking 日期链接Decision analysis(决策分析)decision maker 决策者decision making (决策)decision models 决策模型decision models 决策模型decision rule 决策规则decision support system 决策支持系统decision support systems (决策支持系统) decision tree(决策树)decission tree 决策树deep belief network(深度信念网络)deep learning(深度学习)defult reasoning 默认推理density estimation(密度估计)design methodology 设计方法论dimension reduction(降维) dimensionality reduction(降维)directed graph(有向图)disaster management 灾害管理disastrous event(灾难性事件)discovery(知识发现)dissimilarity (相异性)distributed databases 分布式数据库distributed databases(分布式数据库) distributed query 分布式查询document clustering (文档聚类)domain experts 领域专家domain knowledge 领域知识domain specific language 领域专用语言dynamic databases(动态数据库)dynamic logic 动态逻辑dynamic network(动态网络)dynamic system(动态系统)earth mover's distance(EMD 距离) education 教育efficient algorithm(有效算法)electric commerce 电子商务electronic health records(电子健康档案) entity disambiguation 实体消歧entity recognition 实体识别entity recognition(实体识别)entity resolution 实体解析event detection 事件检测event detection(事件检测)event extraction 事件抽取event identificaton 事件识别exhaustive indexing 完整索引expert system 专家系统expert systems(专家系统)explanation based learning 解释学习factor graph(因子图)feature extraction 特征提取feature extraction(特征提取)feature extraction(特征提取)feature selection (特征选择)feature selection 特征选择feature selection(特征选择)feature space 特征空间first order logic 一阶逻辑formal logic 形式逻辑formal meaning prepresentation 形式意义表示formal semantics 形式语义formal specification 形式描述frame based system 框为本的系统frequent itemsets(频繁项目集)frequent pattern(频繁模式)fuzzy clustering (模糊聚类)fuzzy clustering (模糊聚类)fuzzy clustering (模糊聚类)fuzzy data mining(模糊数据挖掘)fuzzy logic 模糊逻辑fuzzy set theory(模糊集合论)fuzzy set(模糊集)fuzzy sets 模糊集合fuzzy systems 模糊系统gaussian processes(高斯过程)gene expression data 基因表达数据gene expression(基因表达)generative model(生成模型)generative model(生成模型)genetic algorithm 遗传算法genome wide association study(全基因组关联分析) graph classification(图分类)graph classification(图分类)graph clustering(图聚类)graph data(图数据)graph data(图形数据)graph database 图数据库graph database(图数据库)graph mining(图挖掘)graph mining(图挖掘)graph partitioning 图划分graph query 图查询graph structure(图结构)graph theory(图论)graph theory(图论)graph theory(图论)graph theroy 图论graph visualization(图形可视化)graphical user interface 图形用户界面graphical user interfaces(图形用户界面)health care 卫生保健health care(卫生保健)heterogeneous data source 异构数据源heterogeneous data(异构数据)heterogeneous database 异构数据库heterogeneous information network(异构信息网络) heterogeneous network(异构网络)heterogenous ontology 异构本体heuristic rule 启发式规则hidden markov model(隐马尔可夫模型)hidden markov model(隐马尔可夫模型)hidden markov models(隐马尔可夫模型) hierarchical clustering (层次聚类) homogeneous network(同构网络)human centered computing 人机交互技术human computer interaction 人机交互human interaction 人机交互human robot interaction 人机交互image classification(图像分类)image clustering (图像聚类)image mining( 图像挖掘)image reconstruction(图像重建)image retrieval (图像检索)image segmentation(图像分割)inconsistent ontology 本体不一致incremental learning(增量学习)inductive learning (归纳学习)inference mechanisms 推理机制inference mechanisms(推理机制)inference rule 推理规则information cascades(信息追随)information diffusion(信息扩散)information extraction 信息提取information filtering(信息过滤)information filtering(信息过滤)information integration(信息集成)information network analysis(信息网络分析) information network mining(信息网络挖掘) information network(信息网络)information processing 信息处理information processing 信息处理information resource management (信息资源管理) information retrieval models(信息检索模型) information retrieval 信息检索information retrieval(信息检索)information retrieval(信息检索)information science 情报科学information sources 信息源information system( 信息系统)information system(信息系统)information technology(信息技术)information visualization(信息可视化)instance matching 实例匹配intelligent assistant 智能辅助intelligent systems 智能系统interaction network(交互网络)interactive visualization(交互式可视化)kernel function(核函数)kernel operator (核算子)keyword search(关键字检索)knowledege reuse 知识再利用knowledgeknowledgeknowledge acquisitionknowledge base 知识库knowledge based system 知识系统knowledge building 知识建构knowledge capture 知识获取knowledge construction 知识建构knowledge discovery(知识发现)knowledge extraction 知识提取knowledge fusion 知识融合knowledge integrationknowledge management systems 知识管理系统knowledge management 知识管理knowledge management(知识管理)knowledge model 知识模型knowledge reasoningknowledge representationknowledge representation(知识表达) knowledge sharing 知识共享knowledge storageknowledge technology 知识技术knowledge verification 知识验证language model(语言模型)language modeling approach(语言模型方法) large graph(大图)large graph(大图)learning(无监督学习)life science 生命科学linear programming(线性规划)link analysis (链接分析)link prediction(链接预测)link prediction(链接预测)link prediction(链接预测)linked data(关联数据)location based service(基于位置的服务) loclation based services(基于位置的服务) logic programming 逻辑编程logical implication 逻辑蕴涵logistic regression(logistic 回归)machine learning 机器学习machine translation(机器翻译)management system(管理系统)management( 知识管理)manifold learning(流形学习)markov chains 马尔可夫链markov processes(马尔可夫过程)matching function 匹配函数matrix decomposition(矩阵分解)matrix decomposition(矩阵分解)maximum likelihood estimation(最大似然估计)medical research(医学研究)mixture of gaussians(混合高斯模型)mobile computing(移动计算)multi agnet systems 多智能体系统multiagent systems 多智能体系统multimedia 多媒体natural language processing 自然语言处理natural language processing(自然语言处理) nearest neighbor (近邻)network analysis( 网络分析)network analysis(网络分析)network analysis(网络分析)network formation(组网)network structure(网络结构)network theory(网络理论)network topology(网络拓扑)network visualization(网络可视化)neural network(神经网络)neural networks (神经网络)neural networks(神经网络)nonlinear dynamics(非线性动力学)nonmonotonic reasoning 非单调推理nonnegative matrix factorization (非负矩阵分解) nonnegative matrix factorization(非负矩阵分解) object detection(目标检测)object oriented 面向对象object recognition(目标识别)object recognition(目标识别)online community(网络社区)online social network(在线社交网络)online social networks(在线社交网络)ontology alignment 本体映射ontology development 本体开发ontology engineering 本体工程ontology evolution 本体演化ontology extraction 本体抽取ontology interoperablity 互用性本体ontology language 本体语言ontology mapping 本体映射ontology matching 本体匹配ontology versioning 本体版本ontology 本体论open government data 政府公开数据opinion analysis(舆情分析)opinion mining(意见挖掘)opinion mining(意见挖掘)outlier detection(孤立点检测)parallel processing(并行处理)patient care(病人医疗护理)pattern classification(模式分类)pattern matching(模式匹配)pattern mining(模式挖掘)pattern recognition 模式识别pattern recognition(模式识别)pattern recognition(模式识别)personal data(个人数据)prediction algorithms(预测算法)predictive model 预测模型predictive models(预测模型)privacy preservation(隐私保护)probabilistic logic(概率逻辑)probabilistic logic(概率逻辑)probabilistic model(概率模型)probabilistic model(概率模型)probability distribution(概率分布)probability distribution(概率分布)project management(项目管理)pruning technique(修剪技术)quality management 质量管理query expansion(查询扩展)query language 查询语言query language(查询语言)query processing(查询处理)query rewrite 查询重写question answering system 问答系统random forest(随机森林)random graph(随机图)random processes(随机过程)random walk(随机游走)range query(范围查询)RDF database 资源描述框架数据库RDF query 资源描述框架查询RDF repository 资源描述框架存储库RDF storge 资源描述框架存储real time(实时)recommender system(推荐系统)recommender system(推荐系统)recommender systems 推荐系统recommender systems(推荐系统)record linkage 记录链接recurrent neural network(递归神经网络) regression(回归)reinforcement learning 强化学习reinforcement learning(强化学习)relation extraction 关系抽取relational database 关系数据库relational learning 关系学习relevance feedback (相关反馈)resource description framework 资源描述框架restricted boltzmann machines(受限玻尔兹曼机) retrieval models(检索模型)rough set theroy 粗糙集理论rough set 粗糙集rule based system 基于规则系统rule based 基于规则rule induction (规则归纳)rule learning (规则学习)rule learning 规则学习schema mapping 模式映射schema matching 模式匹配scientific domain 科学域search problems(搜索问题)semantic (web) technology 语义技术semantic analysis 语义分析semantic annotation 语义标注semantic computing 语义计算semantic integration 语义集成semantic interpretation 语义解释semantic model 语义模型semantic network 语义网络semantic relatedness 语义相关性semantic relation learning 语义关系学习semantic search 语义检索semantic similarity 语义相似度semantic similarity(语义相似度)semantic web rule language 语义网规则语言semantic web 语义网semantic web(语义网)semantic workflow 语义工作流semi supervised learning(半监督学习)sensor data(传感器数据)sensor networks(传感器网络)sentiment analysis(情感分析)sentiment analysis(情感分析)sequential pattern(序列模式)service oriented architecture 面向服务的体系结构shortest path(最短路径)similar kernel function(相似核函数)similarity measure(相似性度量)similarity relationship (相似关系)similarity search(相似搜索)similarity(相似性)situation aware 情境感知social behavior(社交行为)social influence(社会影响)social interaction(社交互动)social interaction(社交互动)social learning(社会学习)social life networks(社交生活网络)social machine 社交机器social media(社交媒体)social media(社交媒体)social media(社交媒体)social network analysis 社会网络分析social network analysis(社交网络分析)social network(社交网络)social network(社交网络)social science(社会科学)social tagging system(社交标签系统)social tagging(社交标签)social web(社交网页)sparse coding(稀疏编码)sparse matrices(稀疏矩阵)sparse representation(稀疏表示)spatial database(空间数据库)spatial reasoning 空间推理statistical analysis(统计分析)statistical model 统计模型string matching(串匹配)structural risk minimization (结构风险最小化) structured data 结构化数据subgraph matching 子图匹配subspace clustering(子空间聚类)supervised learning( 有support vector machine 支持向量机support vector machines(支持向量机)system dynamics(系统动力学)tag recommendation(标签推荐)taxonmy induction 感应规范temporal logic 时态逻辑temporal reasoning 时序推理text analysis(文本分析)text anaylsis 文本分析text classification (文本分类)text data(文本数据)text mining technique(文本挖掘技术)text mining 文本挖掘text mining(文本挖掘)text summarization(文本摘要)thesaurus alignment 同义对齐time frequency analysis(时频分析)time series analysis( 时time series data(时间序列数据)time series data(时间序列数据)time series(时间序列)topic model(主题模型)topic modeling(主题模型)transfer learning 迁移学习triple store 三元组存储uncertainty reasoning 不精确推理undirected graph(无向图)unified modeling language 统一建模语言unsupervisedupper bound(上界)user behavior(用户行为)user generated content(用户生成内容)utility mining(效用挖掘)visual analytics(可视化分析)visual content(视觉内容)visual representation(视觉表征)visualisation(可视化)visualization technique(可视化技术) visualization tool(可视化工具)web 2.0(网络2.0)web forum(web 论坛)web mining(网络挖掘)web of data 数据网web ontology lanuage 网络本体语言web pages(web 页面)web resource 网络资源web science 万维科学web search (网络检索)web usage mining(web 使用挖掘)wireless networks 无线网络world knowledge 世界知识world wide web 万维网world wide web(万维网)xml database 可扩展标志语言数据库附录 2 Data Mining 知识图谱(共包含二级节点15 个,三级节点93 个)间序列分析)监督学习)领域 二级分类 三级分类。
基于三角模糊数的车联网簇头节点选择方法
基于三角模糊数的车联网簇头节点选择方法
刘蕴 1,3 曹军芳 2 王凤琦 3
(1.周口职业技术学院,周口 466000;2.许昌职业技术学院,许昌 461000;3.长安大学,西安 710064)
【摘要】针对现有车联网簇头节点选择方法不足的问题,提出了一种基于三角模糊数的车联网簇头节点选择方法,依
2018 年 第 9 期
- 31 -
刘蕴,等:基于三角模糊数的车联网簇头节点选择方法
一个簇头可处理的节点数量、传输功率、能量消耗和移 动性等因素,并为上述因素赋不同的权重得到一个度量 标准,进而选取度量值最低的节点为簇头,该方法能够 实现较高的吞吐,但是因为存在较高的通信和计算负 载,无法满足高移动速度节点的需求,因此并不适用于 车联网环境;文献[9]基于近邻传播算法提出了一种基 于移动性的集簇机制,基于车辆间的距离完成簇头的选 取,该方法对移动性提供较好的支持,但存在长聚合延 迟及网络负载较高、吞吐较低等问题。针对现有方法的 不足,本文提出了一种基于三角模糊数的车联网簇头节 点选择方法,主要通过三角模糊数和学习机制完成车辆 节点加速度的预测,并通过定义的加权稳定因子完成簇 头节点的选取。
赖邻近车辆相对速度和相对距离完成簇头的选择。构建了一种典型车联网应用场景,提出了基于三角模糊数和学习机制
的车辆加速度预测方法,基于定义的加权稳定因子,设计了车联网簇头节点选择机制。基于 iTETRIS 构建了车联网仿真平
台进行测试分析,结果表明,与 CMCP 方法和 APROVE 方法相比,提出的簇头节点选择方法有效性较高。
a typical application scenario of IoVs was constructed. Secondly, a vehicle acceleration forecasting method was proposed
Palo Alto Networks Cortex XSOAR Threat Intelligenc
Cortex XSOAR ThreatI ntellig ence Manag ementThreat intelligence is at the core of every security operation. It applies to every security use case. Unfortunately, security teams are too overtaxed to truly take advantage of their threat intelligence, with thousands of alerts and millions of indicators coming at them daily. They require additional context, collaboration, and automation to extract true value. They need a solution that gives them the confidence to do their jobs effectively and shore up their defenses against the attacker’s next move.Cortex® X SOAR Threat Intelligence Management (TIM) takes a unique approach to native threat intelligence management, unifying aggregation, scoring, and sharing of threat intelligence with playbook-driven automation.Features and Capabilities Powerful, native centralized threat intel : Supercharge i nvestigations with instant access to the massive repository of built-in, high-fidelity Palo Alto Networks threat intelli -gence crowdsourced from the largest footprint of network, endpoint, and cloud intel sources (Tens of millions of mal -ware samples collected and firewall sessions analyzed daily).Indicator relationships : Indicator connections enable struc -tured relationships to be created between threat intelligence sources and incidents. These relationships surface importantcontext for security analysts on new threat actors and attack techniques.Hands-free automated playbooks with extensible integra-tions : Take automated action to shut down threats across more than 600 third-party products with purpose-built p laybooks based on proven SOAR capabilities.Granular indicator scoring and management : Take charge of your threat intel with playbook-based indicator lifecycle man -agement and transparent scoring that can be extended and customized with ease.Automated, multi-source feed aggregation : Eliminate manual tasks with automated playbooks to aggregate, parse, prioritize, and distribute relevant indicators in real time to security con -trols for continuous protection.Most comprehensive marketplace : The largest community of integrations with content packs that are prebuilt bundles of integrations, playbooks, dashboards, field subscription services, and all the dependencies needed to support specific security orchestration use cases. With 680+ prebuilt content packs of which 700+ are product integrations, you can buy i ntel on the go using Marketplace points.Business Value Figure 1:Control, enrich, and take actionwith playbook-driven automation Take Full Control Take complete control of your threat intelligence feeds Enrich Incident Response Make smarter incident response decisions by enriching every tool and process Actionable IntelClose the loop between intelligence and action withplaybook-driven automationFigure 2: Take control of your threat intel feedFigure 3:Make smarter decisions by enriching and prioritizing indicatorsFigure 4: Close the loop between intel and action with automationThreat Intelligence Combined with SOAR Security orchestration, automation, and response (SOAR) solutions have been developed to more seamlessly weave threat intelligence management into workflows by combin -ing TIM capabilities with incident management, orchestra -tion, and automation capabilities. Organizations looking for a threat intelligence platform often look for SOAR solutions that can weave threat intelligence into a more unified andautomated workflow—one that matches alerts both to their sources and to compiled threat intelligence data and that can automatically execute an appropriate response.As part of the extensible Cortex XSOAR platform, threat intel management unifies threat intelligence aggregation, scoring, and sharing with playbook-driven automation. It empowers security leaders with instant clarity into high-priority threats to drive the right response, in the right way, across the entire enterprise.way. Automated data enrichment of indicators provides ana-lysts with relevant threat data to make smarter decisions. Integrated case management allows for real-time collabora-tion, boosting operational efficiencies across teams, and auto-mated playbooks speed response across security use cases. Key Use CasesUse Case 1: Proactive Blocking of Known ThreatsChallengeThe security team needs to leverage threat intelligence to block or alert on known bad domains, IPs, hashes, etc. (indicators). The indicators are being collected from many different s ources, which need to be normalized, scored, and analyzed before the customer can push to security devices such as SIEM and firewall for alerting. Detection tools can only handle l imited amounts of threat intelligence data and need to constantly re-prioritize indicators.SolutionIndicator prioritization. Palo Alto Networks Threat Intelligence Management can ingest phishing alerts from email i nboxes through integrations. Once an alert is ingested, a playbook is Use Case 2: Dynamic Allow/Deny ListA dministratio nChallengeManual process for allow/deny lists. Managing a single allow list and updating across the enterprise can involve updating dozens of network devices. Security teams often have to liaise with firewall admins, IT teams, DevOps, and other teams to execute some parts of incident response.SolutionEliminate downtime by using automated playbooks to e xtract valid IP addresses and URLs to exclude from enforce-ment point EDLs, ensuring employees have access to these b usiness-critical applications at all times.Use Case 3: Cross-Functional IntelligenceS haringChallengeIntelligence sharing is unstructured. Most intelligence is still shared via unstructured formats such as email, PDF, blogs, etc. Sharing indicators of compromise is not enough. A dditional context is required for the shared intelligence to have value.Internal alerts3000 Tannery WaySanta Clara, CA 95054 Main: +1.408.753.4000 Sales: +1.866.320.4788 Support: +1.866.898.9087© 2021 Palo Alto Networks, Inc. Palo Alto Networks is a registeredt rademark of Palo Alto Networks. A list of our trademarks can be found at https:///company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. cortex_ds_xsoar-threat-intelligence-management_062221SolutionIndicator connections enable structured relationships to be created between threat intelligence sources. These relation-ships surface important context for security analysts, threat analysts, and other incident response teams, who can collab-orate and resolve incidents via a single platform.Industry-Leading CustomerS uccessOur Customer Success team is dedicated to helping you get the best value from your Cortex XSOAR investments and giving you the utmost confidence that your business is safe. Here are our plans:• Standard Success, included with every Cortex XSOAR sub-scription, makes it easy for you to get started. You’ll have access to self-guided materials and online support tools to get you up and running quickly.• Premium Success, the recommended plan, includes every-thing in the Standard plan plus guided onboarding, custom workshops, 24/7 technical phone support, and access to the Customer Success team to give you a personalized ex-perience to help you realize optimal return on investment (ROI).Flexible DeploymentCortex XSOAR can be deployed on-premises, in a private cloud, or as a fully hosted solution. We offer the platform in multiple tiers to fit your needs.。
研究NLP100篇必读的论文---已整理可直接下载
研究NLP100篇必读的论⽂---已整理可直接下载100篇必读的NLP论⽂⾃⼰汇总的论⽂集,已更新链接:提取码:x7tnThis is a list of 100 important natural language processing (NLP) papers that serious students and researchers working in the field should probably know about and read.这是100篇重要的⾃然语⾔处理(NLP)论⽂的列表,认真的学⽣和研究⼈员在这个领域应该知道和阅读。
This list is compiled by .本榜单由编制。
I welcome any feedback on this list. 我欢迎对这个列表的任何反馈。
This list is originally based on the answers for a Quora question I posted years ago: .这个列表最初是基于我多年前在Quora上发布的⼀个问题的答案:[所有NLP学⽣都应该阅读的最重要的研究论⽂是什么?]( -are-the-most-important-research-paper -which-all-NLP-students-should- definitread)。
I thank all the people who contributed to the original post. 我感谢所有为原创⽂章做出贡献的⼈。
This list is far from complete or objective, and is evolving, as important papers are being published year after year.由于重要的论⽂年复⼀年地发表,这份清单还远远不够完整和客观,⽽且还在不断发展。
基于改进随机游走的复杂网络节点重要性评估
Operations Research and Fuzziology 运筹与模糊学, 2023, 13(1), 329-340 Published Online February 2023 in Hans. https:///journal/orf https:///10.12677/orf.2023.131036基于改进随机游走的复杂网络节点重要性评估蔡晓楠,郑中团*上海工程技术大学数理与统计学院,上海收稿日期:2023年1月23日;录用日期:2023年2月17日;发布日期:2023年2月23日摘要复杂系统可以抽象为复杂网络,重要节点评估与识别是复杂网络的一个热点问题。
针对网络拓扑结构和节点自身属性对有向复杂网络重要节点的影响,提出基于改进随机游走的节点重要性评估方法。
首先对节点的出度和入度分别附参数求出节点联合度数为节点质量,并通过调节参数评估节点出度与入度对节点重要性的影响;其次使用SimRank 算法得任意两个节点相似值的倒数为引力模型的距离,考虑节点间的拓扑结构;最后通过相对路径数比值做引力模型的系数,考虑节点间信息传播的影响效果。
任意两节点的作用力构造引力矩阵,将引力矩阵行归一化构造转移矩阵,然后随机游走对节点进行排序。
使用极大强连通性、极大弱连通性和脆弱性等评估指标在四个真实网络上进行实验对比,结果表明,提出的算法相比LeaderRank 、PageRank 、HITs 等方法能更准确地评估节点的重要性。
将复杂网络的多种特征进行融合,新创建的重要节点评估方法可以运用在生物领域和经济贸易领域等。
关键词有向复杂网络,节点重要度,节点相似性,引力模型,相对路径Evaluation of Node Importance in Complex Networks Based on Improved Random WalkXiaonan Cai, Zhongtuan Zheng *School of Mathematics, Physics and Statistics, Shanghai University of Engineering Science, Shanghai Received: Jan. 23rd, 2023; accepted: Feb. 17th, 2023; published: Feb. 23rd, 2023AbstractComplex systems can be abstracted as complex networks. The evaluation and identification of important nodes is a hot issue in complex networks Aiming at the influence of network topology*通讯作者。
2021最新5G恒山XX信息科技有限公司面试试题(含答案)
精选考试类应用文档,如果您需要使用本文档,请点击下载,另外祝您生活愉快,工作顺利,万事如意!精选考试类文档,如果需要,请下载,希望能帮助到你们!XX某公司5G考试题库及答案———解老师温馨提示:同学们,经过培训学习,你一定积累了很多知识,现在请认真、仔细地完成这张试题吧。
加油!一、单选题( )1.如下5G的关键技术中,不可以提升网络频谱效率的是?A.新信道编码B.256QAM高阶调整C.灵活子载波带宽D.MassiveMIMO正确答案:C( )2.HSS和SCEF之间的接口是_________________A. S6tB. S11C. S1D. S5正确答案:A( )3.5G可以配置的PCI有_________________个A. 504B. 512C. 1008D. 1024正确答案:C( )4.以下选项适用于URLLC场景的是_________________A.无人驾驶B.VRC.高清视频D.抄表业务正确答案:A( )5.5G2.5ms双周期帧结构支持的最大广播波束为_________________个A.2B.4C.7D.8正确答案:C( )6.低频信道传播损耗组成不包括_________________A.自由空间传播损耗B.穿透损耗C.雨衰和大气影响D.衍射绕射损耗正确答案:C( )7.一个BWP最少占用多少个RBA.14 ;B.20;C.24;D.28正确答案:C( )8.CU/DU分离之后,实现鲁棒性IP头压缩、加密解密等功能的网元是?A.AUD.U正确答案:C( )9.当TCI配置关联到两个RS资源,应该使用QCL为_________________的资源A. typeA;B. typeB;C. typeC;D. typeD。
正确答案:D( )10.5GNR下,DLLayermapping的时候当layer数大于_________________,codeword才是双流A.3B.5C.2D.4正确答案:D( )11.下列哪项是IDLE和INACTIVE态下共有的功能_________________A. UE的DRX由RRC层配置;B. 网络可以配置UE移动性;C. UE 储存AS上下文;D. 移动到其他RNA后执行RNA update;正确答案:B( )12.TS 38.211 ON NR是下面哪个协议_________________A.Physical channels and modulationB.NR and NG-RAN Overall DescriptionC.Radio Resource Control(RRC) ProtocolD.Base Station(BS) radio transmission and reception正确答案:A( )13.频域上,SS/PBCH block由多少个连续的RB构成A.24个;B.20个;C.12个;D.10个正确答案:B( )14.5G从3GPP哪个release版本开始的?_________________A.B、R15B.D、R17C.A、R14D.C、R16正确答案:A( )15.5G RAN2.0版本gNB主控单板以太网业务端口DEVIP最大支持配置是多少个C.5D.8正确答案:D( )16.短序列为NR新增的PRACH Preamble格式,R15共9种格式,其中C2格式最大小区覆盖半径为_________________A.9.29kmB.5.35kmC.3.86kmD.7.56km正确答案:A( )17.5GNR下,一个SS/PBCH block包含_________________个OFDM symbolsA. 1B. 2C. 3D. 4正确答案:D( )18.DCDU-12B为直流配电单元,为机柜内各部件提供多大的直流电源输入A.-24B.48C.-48D.24正确答案:C( )19.关于SS/PBCH block,以下说法错误的是_________________。
Cradlepoint COR IBR1100系列3G 4G LTE网络解决方案说明说明书
1Cradlepoint COR IBR1100/IBR1150 SpecificationsFigure 1: COR IBR1100Highly Available, Cloud-Managed Networking for Extreme ConditionsThe Cradlepoint COR IBR1100 Series is a compact, ruggedized 3G/4G/LTE networking solution designed for mission critical connectivity in the most challenging environments.Ideal for in-vehicle networks including police cars, ambulances, and mass transit, this cloudmanaged solution provides organizations the ability to scale deployments quickly and manage their vehicle networks easily in real-time.With an extensive list of safety and hardening certifications, the COR IBR1100 is engineered to protect against extreme temperatures, humidity, shocks, vibrations, dust, water splash, reverse polarity and transient voltage.Key Features• Cloud-managed for zero-touch deployment and intelligent management • Internal 3G/4G modem with secured SIM card access and dual SIM slots• LTE support for all major U.S. carriers and Europe/international operators (failover to HSPA+ or EVDO) • Software-defined radio supports multiple carriers (Gobi)• WiFi (IBR1100) and non-WiFi versions (IBR1150) available: IBR1100 includes dual-band dual-concurrent 2.4/5 GHz 802.11 a/b/g/n/ac WiFi; 2 x 2 MIMO with two external dualband antenna connectors • Ignition sensingRuggedized: protects against vibration, shock, dust, splash, & humidityBuilt-in transient and reverse polarity voltage protection; 9–36 DC voltage input range• Integrated temperature sensor• Three 10/100 Ethernet ports (LAN/WAN configurable)2• Antenna connectors for external cellular modem (two) and active GPS (one) • RS-232 serial portFigure 2: COR IBR1100 FrontFigure 3: COR IBR1100 BackFeaturesWAN• 4G LTE/HSPA+/EVDO (multi-carrier)• WiFi as WAN¹, with WPA2 Enterprise Authentication for WiFi-as-WAN³ • Failover/Failback • Load Balancing• Advanced Modem Failure Check • WAN Port Speed Control • WAN/LAN Affinity • IP PassthroughLAN• VLAN 802.1Q• DHCP Server, Client, Relay DNS and DNS Proxy DynDNS • UPnP • DMZ3• Multicast/Multicast Proxy• QoS (DSCP and Priority Queuing) • MAC Address FilteringWiFi¹• Dual-Band Dual-Concurrent • 802.11 a/b/g/n/ac• Up to 128 connected devices (64 per radio – 2.4 GHz and 5 GHz) • Multiple SSIDs: 2 per radio (4 total) • WPA2 Enterprise (WiFi) • Hotspot/Captive Portal • SSID-based PriorityManagement• Cradlepoint Enterprise Cloud Manager² • Web UI, API, CLI• Active GPS support on all models • Data Usage Alerts (router and per client) • Advanced Troubleshooting (support) • Device Alerts • SNMP • SMS control • Serial RedirectorVPN and Routing• IPsec Tunnel – up to 5 concurrent sessions • L2TP³ • GRE Tunnel • OSPF/BGP/RIP³ • Per-Interface Routing • Routing Rules • NAT-less Routing• Virtual Server/Port Forwarding • NEMO/DMNR³ • IPv6 • VRRP³ STP³ NHRP³Security4• RADIUS and TACACS+• 802.1x authentication for Ethernet • Zscaler integration³ • Certificate support • ALGs• MAC Address Filtering• Advanced Security Mode (local user management only) • Per-Client Web Filtering • IP Filtering• Content Filtering (basic) • Website FilteringCloud Optimized IP Communications• Automated WAN Failover/Failback support• WAN Affinity and QoS allow prioritization of VoIP services • Advanced VPN connectivity options to HQ• SIP ALG and NAT to allow VoIP and UC communications to traverse firewall • MAC Address Filtering• 802.1p/q for LAN QoS segmentation and treatment of VoIP on LAN • Private Network support (wired and 4G WAN) • Cloud-based management²1 – WiFi-related functions are only supported on IBR1100 models2 – Enterprise Cloud Manager requires a subscription3 – Requires an Extended Enterprise LicenseSpecificationsWAN• Integrated 4G LTE modem (with 3G failover)• Three LAN/WAN switchable 10/100 Ethernet ports – one default WAN (cable/DSL/T1/satellite/Metro Ethernet) • WiFi as WAN, Metro WiFi; 2x2 MIMO “N” 2.4 GHz or 5 GHz; 802.11 a/b/g/n/ac (IBR1100 only)5LAN• Dual-band dual-concurrent WiFi; 802.11 a/b/g/n/ac (IBR1100 only) • Three LAN/WAN switchable 10/100 Ethernet ports – two default LAN • Serial console support for out-of-band management of a connected device PORTS• Power • 2-wire GPIO • USB 2.0• 3 Ethernet LAN/WAN• 2 cellular antenna connectors (SMA) • 1 active GPS antenna connector (SMA) • 2 WiFi antenna connectors (R-SMA)• Serial DE-9 (commonly called “DB -9”) connector – RS-232 (out-of-band management of an external device requires a null modem adapter/cable) TEMPERATURE• −30° C to 70° C (−22 °F to +158 °F) operating • −40 °C to 85 °C (−40 °F to +185 °F) storage• Includes temperature sensor with options for alerts and automatic shutoff HUMIDITY (non-condensing)• 5% to 95% operating • 5% to 95% storage POWER• DC input steady state voltage range: 9–36 VDC (requires inline fuse for vehicle installations)– For 9–24 VDC installations, use a 3 A fuse – For > 24 VDC installations, use a 2.5 A fuse• Reverse polarity and transient voltage protection per ISO 7637-2 • Ignition sensing (automatic ON and time-delay OFF) • Power consumption:– idle: typical=400mA@12VDC (4.8W); worst case=800mA@12VDC (9.6W) – Tx/Rx: typical=650mA@12VDC (7.8W); worst case=1300mA@12VDC (15.6W) – 12VDC 2A adapter recommendedSIZE – 5.3 in x 4.4 in x 1.4 in (134 mm x 112 mm x 35 mm)6WEIGHT – 16.1 oz (457 g) CERTIFICATIONS• FCC, CE, IC• WiFi Alliance (IBR1100 only) – 802.11a/b/g/n certified, 802.11ac supported • Safety: UL/CUL, CB Scheme, EN60950-1 • Hazardous Locations: Class I, Div. 2 (pending)• Shock/Vibration/Humidity: compliant with MIL STD 810G and SAEJ1455• Ingress Protection: compliant with IP64 (includes protection from dust and splashing water) • Materials: WEEE, RoHS, RoHS-2, California Prop 65 • Vehicle: E-Mark, compliant with ISO 7637-2 • Telecom: PTCRB/CTIA, GCF-CC GPS• GPS Protocols: TAIP and NMEA 0183 V3.0 • Satellite channels: 12 channel, continuous tracking • 1 Hz refresh rate • Accuracy:– < 2m: 50% – < 5m: 90% • Acquisition:– Hot start: 1 second – Warm start: 29 seconds – Cold start: 32 seconds • Sensitivity– Tracking: −161 dBm (tracking sensitivity is the lowest GNSS signal level for which the device can still detect an in-view satellite 50% of the time when in sequential tracking mode) – Acquisition (standalone): −145 dBm (acquisition sensitivity is the lowest GNSS signal level for which the device can still detect an in-view satellite 50% of the time) • Operational limits: altitude < 6000 m or velocity < 100 m/s (either limit may be exceeded, but not both)What’s In The Box• Ruggedized router with integrated business-class 3G/4G modem; includes integrated mounting plate • Two meter locking power and GPIO cable (direct wire) Quick Start Guide with warranty informationNOTE: Due to the diverse needs of customers, the COR IBR1100/IBR1150 package does not include a power adapter or antennas. See the Accessories section below for several power and antenna options.7Feature Details• WAN Security – NAT, SPI, ALG, inbound filtering of IP addresses, port blocking, service filtering (FTP, SMTP, HTTP, RPL, SNMP, DNS, ICMP, NNTP, POP3, SSH), protocol filtering, WAN ping (allow/ignore) • Redundancy and Load Balancing – Failover/failback with 4G, 3G, Ethernet with rule selection, advanced load balancing options (round robin, spillover, data usage, rate), WAN failure detection, VRRP • Intelligent Routing – UPnP, DMZ, virtual server/port forwarding, routing rules, NATless routing, wired or wireless WAN-to-LAN IP passthrough, route management, perinterface routing, content filtering, IP filtering, website filtering, per-client Web filtering, local DHCP server, DHCP client, DHCP relay, DNS, DNS proxy; ALGs: PPTP, SIP, TFTP, FTP, IRC; MAC address filtering, Dynamic DNS, LAN/WAN affinity, VLAN 802.1Q (coming Q4), STP, enterprise routing protocols: BGP/OSPF/RIP, multicast proxy support, IP setting overrides, IPv6 support • Management – Enterprise Cloud Manager: cloud-enabled management and application platform (subscription-based); web-based GUI (local management), optional RADIUS or TACACS+ username/password; remote WAN web-based management w/ access control (HTTP, HTTPS); SNMP v1, v2c, & v3; CLI over SSH, SSH to serial, SSH to telnet; API; one-button firmware upgrade; modem configuration, update, and management; modem data usage w/ alerts, per-client data usage; custom AT scripting to modems • Performance & Health Monitoring – Advanced QoS with traffic shaping, with DSCP/DiffServe QoS, Modem Health Management (MHM) improves connectivity of modem, SSID-based priority, WAN port speed control, several levels of basic and advanced logging for troubleshooting • VPN (IPsec) – Tunnel, NAT-T, and transport modes; connect to Cradlepoint, Cisco/Linksys, CheckPoint, Watchguard, Juniper, SonicWall, Adtran and others; certificate support; Hash (MD5, SHA128, SHA256, SHA384, SHA512), Cipher (AES, 3DES, DES); support for 5 concurrent connections, GRE tunneling, L2TP support, multiple networks supported in a single tunnel, site-to-site dynamic VPN with NHRP • GPS – Active GPS antenna port; GUI mapping; multiple server reporting (coming Q4) with LAN and WAN options; TAIP and NMEA; custom intervals based on time and/or velocity (coming Q4)Support and Warranty∙ CradleCare Support Agreement available with technical support, software upgrades, and advanced hardware exchange – 1, 3, and 5 year optional.∙One-year limited hardware warranty available in the US and Canada; two-year limited hardware warranty for integrated EU products when purchased from an authorized EU distributor – extend warranty to 2, 3, or 5 yearsAccessoriesBecause of the diversity of customer needs, the COR IBR1100/IBR1150 does NOT include a power adapter or antennas in the box (it does include a direct wire power/GPIO cable for vehicle installation). Cradlepoint offers several accessory options for power adapters or antennas. Please see an associate for details.8Business-Grade Modem SpecificationsCOR IBR1100/IBR1150 models include an integrated 4G LTE modem – specific model names include a specific modem.Please note that LPE models are flexible and support bands for multiple cellular providers; however, only the frequency bands in bold below are supported by the listed provider.COR IBR1100LPE-VZ, COR IBR1150LPE-VZ – 4G LTE/HSPA+/EVDO• Technology : LTE , HSPA+, EVDO Rev A• Downlink Rates : LTE 100 Mbps, HSPA+ 21.1 Mbps, EVDO 3.1 Mbps (theoretical) • Uplink Rates : LTE 50 Mbps, HSPA+ 5.76 Mbps, EVDO 1.8 Mbps (theoretical) • Frequency Bands :– LTE Band 2 (1900 MHz), Band 4 – AWS (1700/2100 MHz), Band 5 (850 MHz), Band 13 (700 MHz), Band 17 (700 MHz), Band 25 (1900 MHz) – HSPA+/UMTS (850/900/1900/2100 MHz, AWS) – GSM/GPRS/EDGE (850/900/1800/1900 MHz) – CDMA EVDO Rev A/1xRTT (800/1900 MHz)• Power : LTE 23 dBm +/− 1, HSPA+ 23 dBm +/− 1, EVDO 24 dBm +0.5/−1 (typical conducted) • Antennas : two SMA male (plug), finger tighten only (maximum torque spec is 7 kgfcm) • GPS : active GPS support• Industry Standards & Certs : FCC。
基于边缘检测的抗遮挡相关滤波跟踪算法
基于边缘检测的抗遮挡相关滤波跟踪算法唐艺北方工业大学 北京 100144摘要:无人机跟踪目标因其便利性得到越来越多的关注。
基于相关滤波算法利用边缘检测优化样本质量,并在边缘检测打分环节加入平滑约束项,增加了候选框包含目标的准确度,达到降低计算复杂度、提高跟踪鲁棒性的效果。
利用自适应多特征融合增强特征表达能力,提高目标跟踪精准度。
引入遮挡判断机制和自适应更新学习率,减少遮挡对滤波模板的影响,提高目标跟踪成功率。
通过在OTB-2015和UAV123数据集上的实验进行定性定量的评估,论证了所研究算法相较于其他跟踪算法具有一定的优越性。
关键词:无人机 目标追踪 相关滤波 多特征融合 边缘检测中图分类号:TN713;TP391.41;TG441.7文献标识码:A 文章编号:1672-3791(2024)05-0057-04 The Anti-Occlusion Correlation Filtering Tracking AlgorithmBased on Edge DetectionTANG YiNorth China University of Technology, Beijing, 100144 ChinaAbstract: For its convenience, tracking targets with unmanned aerial vehicles is getting more and more attention. Based on the correlation filtering algorithm, the quality of samples is optimized by edge detection, and smoothing constraints are added to the edge detection scoring link, which increases the accuracy of targets included in candi⁃date boxes, and achieves the effects of reducing computational complexity and improving tracking robustness. Adap⁃tive multi-feature fusion is used to enhance the feature expression capability, which improves the accuracy of target tracking. The occlusion detection mechanism and the adaptive updating learning rate are introduced to reduce the impact of occlusion on filtering templates, which improves the success rate of target tracking. Qualitative evaluation and quantitative evaluation are conducted through experiments on OTB-2015 and UAV123 datasets, which dem⁃onstrates the superiority of the studied algorithm over other tracking algorithms.Key Words: Unmanned aerial vehicle; Target tracking; Correlation filtering; Multi-feature fusion; Edge detection近年来,无人机成为热点话题,具有不同用途的无人机频繁出现在大众视野。
euler ancestral sampling 解析 -回复
euler ancestral sampling 解析-回复"Euler Ancestral Sampling解析"Euler Ancestral Sampling(EAS)是一种用于从图模型中进行概率推断的方法。
它是以瑞士数学家欧拉的名字命名的,以纪念他在图论和概率论领域的杰出贡献。
EAS是一种基于贝叶斯网络的近似推断技术,能够在给定观察数据的情况下,对未观察的变量进行推断。
本文将对Euler Ancestral Sampling进行详细解析,并一步一步回答该方法的基本原理和应用。
第一部分:基本原理Euler Ancestral Sampling的基本原理是基于贝叶斯网络模型。
贝叶斯网络是由有向无环图(DAG)表示的概率模型,其中节点表示随机变量,边表示变量之间的依赖关系。
首先,让我们回顾一下贝叶斯网络的基本概念。
1. 节点(Nodes):每个节点表示一个随机变量,可以是离散型或连续型变量。
2. 边(Edges):边表示变量之间的依赖关系,有向边表示一个变量直接依赖于另一个变量。
3. 条件独立性(Conditional Independence):在贝叶斯网络中,给定其父节点的条件下,每个节点与其非后代节点是条件独立的。
Euler Ancestral Sampling 的目标是通过给定的观察数据来计算未观察到的变量的后验分布。
它通过生成网络的样本来完成这个任务。
EAS的方法相对简单,但能提供与完全贝叶斯推断相近的效果。
第二部分:Euler Ancestral Sampling步骤现在,我们将一步一步地解析EAS的基本步骤。
1. 构建贝叶斯网络:首先,我们需要构建一个贝叶斯网络来表示我们的概率模型。
选择合适的节点和变量之间的依赖关系。
这是根据实际问题和领域知识进行的。
2. 选择观察数据和未观察数据:接下来,我们需要选择一些观察数据和未观察数据。
观察数据是我们已知的数据,而未观察数据是我们需要进行推断的变量。
面向智能交通的无线传感网络分簇算法
面向智能交通的无线传感网络分簇算法苏航【摘要】Wireless sensor networks (WSNs) are important components of intelligent transportation systems.The energy efficiency of WSNs can benefit from a suitable clustering technique.Based on Energy Efficient Clustering (INEEC) scheme, a clustering algorithm of WSNs is studied in this paper.Operating time is divided into several rounds.Cluster head (CH) is determined in each round to balance energy consumption of CH.During a selection phase of CH, each node chooses a random number and computes the threshold value of the random number by residual energy and the average of the regional energy of all sensors in each cluster.If the random number is less than the threshold value, the node becomes a CH for the current round.Each CH broadcasts a joining request message to the rest of nodes.If a non-CH node receives many joining request messages, the node decides to join the closest cluster accordingly.Those non-CH nodes that do not receive a joining request message are considered as isolated nodes.In order to improve the energy efficiency of an isolated node, INEEC scheme determines its transmission pared with the HEED and LEACH algorithms, the simulation results show that INEEC scheme has better performance in reducing energy consumption which means this scheme has the least isolated nodes, the minimum transmission delay, and a more uniform CH distribution.In detail, the network lifetime increases nearly 23.5% compared with the HEED algorithm.Key problems inthe application of the INEEC algorithm, such as high energy consumption, low energy efficiency and network lifetime, are well solved in this study.%无线传感网络是智能交通系统的关键组成部分.合理的分簇技术有利用于提高无线传感网络能量利用率.研究了基于孤点感知能效的无线传感网络分簇算法(INEEC),该算法将时间划分等间隔的轮,每一轮进行簇头选择,平衡簇头的能耗.在簇头选择阶段,每个节点先选择一个随机数,依据各节点的能量以及该区域的局部能量信息估计门限值.若随机数小于门限值,就成为簇头.每个簇头节点广播请求加入消息,其他节点接收消息后,加入最近的簇.若没有收到任何请求加入消息,节点就为孤点.仿真结果表明,相比于HEED和LEACH算法,该算法孤点数最少,传输时延最低,簇头分布更加均匀使总体能耗降低,网络寿命比HEED算法提高近23.5%,较好解决了同类算法在应用中能量效率较低、能耗较高、网络生命周期较短的关键问题.【期刊名称】《交通信息与安全》【年(卷),期】2017(035)003【总页数】7页(P74-79,106)【关键词】智能交通;无线传感网络;分簇;孤点【作者】苏航【作者单位】中国交通通信信息中心交通安全应急信息技术国家工程实验室北京100011【正文语种】中文【中图分类】TP393智能交通系统在交通中的应用主要体现在交通信息采集、交通控制和诱导等方面,其中无线传感技术是交通信息采集与处理的最主要技术手段,是系统建设的基础[1]。
Ubiquitous CSCL的概念模型与关键技术要素
UbiquitousCSCL的概念模型与关键技术要素普适计算(ubiquitous/pervasive computing)的思想在上世纪90年代初被提出来后,在计算机和教育技术等领域受到了广泛的关注。
由于普适计算强调人与计算环境之间的紧密联系,强调计算机和网络应该更有效地渗透到人们的学习之中,让人们在任何时间、任何地点都能方便快捷地与他人协作、获得网络计算提供的各种服务,因而使得泛在学习受到了研究者的普遍关注。
泛在学习的目标是使学习过程中使用的计算设备和技术“消失”在学习者日常生活和学习任务的背景当中,保证学习者在得到计算服务的同时无需觉察计算机的存在和为此而分心,从而使其注意力回归到要完成的学习任务本身。
以自然、和谐的学习交互环境为主要特征的计算机支持的泛在协作学习(Ubiquitous CSCL)是CSCL发展的方向,具有广阔的发展前景。
一、Ubiquitous CSCL的概念分析模型(一)CL及CSCL概念的发展协作学习(CL)主要是以“学”为中心的学习方式,它注重学生在集体中、在与同伴的交往和交互过程中促进自身个体的发展。
在教育中注重“协作学习”的思想,最早可以追溯到两千年前《学记》中的论述“独学而无友,则孤陋而寡闻”m。
在西方。
古老的犹太法典中就告诫人们要向书本、教师和伙伴学习。
因此,在计算机支持的协作学习受到学界广泛关注之前,协作学习便已经在课堂教学中得到了很好的应用与发展。
随着计算机技术的快速发展,计算机支持的协同工作(CSCW)得到了广泛研究,计算机支持的协作学习(CSCL)便是诞生于对计算机支持的协同工作和协作学习研究基础之上。
CSCL是教育技术的一种新兴模式,同CSCL的前身CAI 和ITS相比,在学习、教育、研究方法和研究问题等方面具有非常大的不同。
CSCL的研究趋向于过程而不是结果,其研究方法注重描述而不是实验性。
此外,对CSCL的研究关注参与者的交谈、由学习者团队支持及获得的作品和学习者本人对其工作的解释。
Robotics andComputer-IntegratedManufacturing
On generating the motion of industrial robot manipulatorsK.Kaltsoukalas,S.Makris,G.Chryssolouris n,1Laboratory for Manufacturing Systems and Automation,University of Patras,Greecea r t i c l e i n f oArticle history:Received17October2013Received in revised form19September2014Accepted8October2014Available online29October2014Keywords:Path planningIndustrial robot motionGrid searcha b s t r a c tIn this study,an intelligent search algorithm is proposed to define the path that leads to the desiredposition and orientation of an industrial robot's manipulator end effector.The search algorithm graduallyapproaches the desired configuration by selecting and evaluating a number of alternative robot'sconfigurations.A grid of the robot's alternative configurations is constructed using a set of parameterswhich are reducing the search space to minimize the computational time.In the evaluation of thealternatives,multiple criteria are used in order for the different requirements to be fulfilled.Thealternative configurations are generated with emphasis being given to the robot's joints that mainlyaffect the position of the end effector.Grid resolution and size parameters are set on the basis of thedesired output.High resolution is used for a smooth path and lower for a rough estimation,by providingonly a number of the intermediate points to the goal position.The path derived is a series of robotconfigurations.This method provides an inexperienced robot programmer withflexibility to generateautomatically a robotic path that would fulfill the desired criteria without having to record intermediatepoints to the goal position.&2014Elsevier Ltd.All rights reserved.1.IntroductionIn the recent years,there is an increasing need forflexiblemanufacturing systems,capable of adapting to different marketdemands and product-mix changes[1].The dynamic environmentin production requires an increasing number of reconfigurationson assembly manufacturing resources[3].In automated assemblysystems such as robots,theflexibility is normally restricted due tothe high programming effort required in order for robot trajec-tories to adjust to different assembly cell layouts.Experiencedrobot programmers have to spend considerable time in order tooptimize the robotic paths for each specific application by usingconventional programming methods.A method that is widelyused is programming by demonstration,where the intermediatepoints to the goal position are recorded by sequentially movingthe robot to each position using the teach pendant.The robot'sfinal path is generated by connecting the recorded points via arobot controller,which tries to pass through all the points bytaking into consideration the dynamic constraints of the robot.Therobot'sfinal trajectory is highly dependent on the points recordedand the experience of the respective programmer,who has carriedthis out.Automatic path planning for robotics poses the questionas to how a robot can move from its initial to thefinal position andhas been investigated during the last decades mainly focusing onpath planning for collision avoidance.One of the techniques for motion planning is the construction ofapproximate models by sampling their configuration space.Over thelast few years,there has been a lot of work carried out for theimprovement of sampling based motion planning algorithms.It ishard to define a single criterion that can classify all planners indistinct categories.The classical separation is between roadmap-based planners and tree-based planners[4].The probabilistic road-map path planning was introduced in[5]as a new method ofcomputing collision-free paths for robots.The method proceeds intwo phases:those of learning and query.In the learning phase,aprobabilistic roadmap is constructed by generating the robot'srandom free configurations and connecting them using a simplemotion planner,also known as a local planner.Different approacheshave been used to address a variety of problems.In[6],two differentmethods for constructing and querying roadmaps are suggested forthe motion planning of deformable objects.Another two deforma-tion techniques that can be applied to the resulting path are alsopresented.The obstacle probabilistic roadmap method is introducedinto[7],where several strategies for node generation are describedand multi-stage connection strategies are proposed for cluttered3-dimensional workspaces.In[8],a randomized planner is describedfor planning CF-compliant motion between two arbitrary polyhedralsolids,by extending the probabilistic roadmap paradigm for plan-ning collision-free motion to the space of contact configurations.Thekey to this approach is a novel sampling strategy of generatingrandom CF-compliant configurations.Contents lists available at ScienceDirectjournal homepage:/locate/rcimRobotics and Computer-Integrated Manufacturing/10.1016/j.rcim.2014.10.0020736-5845/&2014Elsevier Ltd.All rightsreserved.n Corresponding author.E-mail address:xrisol@lms.mech.upatras.gr(G.Chryssolouris).1Tel.:þ302610997262.Robotics and Computer-Integrated Manufacturing32(2015)65–71The concept of Rapidly-exploring the Random Tree is introduced in[9].The basic idea is that an initial sample(the starting config-uration)is the root of the tree and newly produced samples are then connected to the samples already existing in the tree.In[10],two Rapidly-exploring Random trees(RRTs)were rooted at the start and during the goal configurations.Each one of the trees explores the space around it and also advances towards each other through the use of a simple greedy heuristics.Although it was originally designed that motions be planned for a human arm(modeled as a 7-DOF kinematic chain),in the automatic graphic animation of collision-free grasping and manipulation tasks,the algorithm has been applied to a variety of path planning problems.Tree-based planners have proven to be a good framework for dealing with real-time planning and re-planning problems.In[11],a re-planning algorithm is presented for repairing Rapidly-exploring Random Trees when changes are made to the configuration space.Instead of abandoning the current RRT,the algorithm efficiently removes only the newly-invalid parts and maintains the rest.Dynamic obstacle avoidance has been investigated for the mobile robots found in industrial environments in[12].However,industrial manipulators are typically programmed to execute predefined paths. The two main categories of robotic programming methods are those of online programming and offline programming.In[13],an online path planning and programming support system is proposed for the transformation of the user's interaction into a simplified task that generates acceptable trajectories, applicable to industrial robot programming.In[14],a novel approach to robot programming using an Augmented Reality environment was proposed,offeringflexibility and adaptability to different environments when an on-site robot programming approach was desired.The path planning methodology included a beam search algorithm to generate paths.In[15],there is a similar study,where the user is able to perform operations,namely via-points selection and modification,in order for a smooth and collision-free path to be achieved.An on-line robot motion planning approach that is based upon pre-computing the global configuration space(C-space)connectivity is proposed.In[16],the motion planner consists of an off-line stage and an on-line stage and the collision-free path is searched in this C-space by using the A*algorithm under a multi-resolution strategy.In this study,an intelligent search algorithm is proposed to define an industrial robot manipulator's path that leads to the desired position and orientation of the end effector.A maximum number of alternative configurations are selected and evaluated in each step until the desired configuration is approached within a predefined error.The alternative configurations are generated in a clever way giving emphasis to the joint angles that mainly affect the robot's position in the workspace.In the configuration space, there is a grid constructed to derive the robot's alternative config-urations.A set of clever parameters are used to reduce the search space and increase the performance of the algorithm.In the evaluation of the alternatives,multiple criteria that would enhance the algorithm'sflexibility to extend are used,in order for the different requirements,namely the shortest path,to be fulfilled.2.ApproachFor an industrial robot manipulator(usually six degrees of freedom),the path planning problem is described via three hierarchical levels as shown in Fig.1.For a given starting and goal position,the requested paths include the robot's intermediate configurations,where each configuration is a set of six joint parameters.2.1.Grid search of the alternative configurationFor an industrial robot manipulator with n degrees of freedom (n-DoF),the alternative configurations are defined from a set of n joint angles.If the possible values of each joint angle are equal to 2kþ1,with resolution dΘ(Fig.2),the number of alternative configurations is given by the following equation:Number of alternative configurations N¼ð2kþ1Þnð1ÞFor each joint angle that can be incremented,a dθn resolution has to be selected.The number of alternative configurations increases for a robot with higher degrees of freedom and a larger grid(k)size.For this reason,the following parameters are used for the reduction of the alternative configurations,where a multi-criteria evaluation will be carried out as follows:Decision Horizon(DH):This parameter is taking values from one to n(DoF of the robot).Starting from the base of the robot,DHFig.1.Hierarchical levels for path planning problem(6DOFs robot).K.Kaltsoukalas et al./Robotics and Computer-Integrated Manufacturing32(2015)65–7166parameter de fines the degrees of freedom which are taken in consideration while constructing the grid of the alternative con figurations.For joint angles,in the decision horizon,a grid is created as shown in Fig.2.For the remaining joints,outside the decision horizon,only a number of samples are randomly taken in order to have complete alternative robot con figurations.The robot's joints are separated into those that mainly affect therobot's movement in the workspace (position of the end effector)and those that mainly affect the orientation of the end effector.When only the target position has to be reached and the orientation of the end effector is ignored this parameter could be reduced for better performance and less computational time.Maximum number of alternatives (MNA ):A maximum number of alternatives from the grid in the decision horizon are randomly selected for evaluation.If MNA 4N then automatically the parameter MNA ¼N .Sample Rate (SR ):A sample rate is de fined as the number of samples taken from the joints,outside the decision horizon,in order to form the robot's complete alternative con figurations.When the orientation of the end effector is considered,SR parameter should be increased in order to generate more alternative con figurations which affect the orientation of the end effector.For an industrial manipulator with 6DOF (n ¼6,Fig.3),even for k ¼1and d Θ¼101for each degree of freedom,the number of alternative con figurations is given by Eq.(1):(Figs.4–6)N ¼36¼729Alternative neighbor configurations of robotBy setting DH ¼3,only the first three degrees of freedom are taken into consideration whilst the number of the alternative con figuration on the grid drops down toN ðDH ¼3Þ¼33¼27Alternative configurations for DH ¼3The maximum number of alternatives in the decision horizon is de fined as follows:MNA r NThe probability of getting the alternative con figuration closer to the desired position is given by the following equation:p ðDH ;MNA Þ¼MNA N ð2ÞFrom [1]and [2]p ðDH ;MNA Þ¼MNA ð2k þ1Þð3ÞTherefore,in the example with the 6DOFs robot where,the number of the alternative con figurations was found to be N ¼27(for DH ¼3)If MNA ¼20,the probability of getting the alternative con fig-uration that is closer to the desired position is given by Eq.(2)Fig.2.Available joint angles for each degree of freedom in theDH.AU Smart5Six,6DOF,IndustrialManipulator.Fig.4.Alternative con figurations using MNA ¼3,DH ¼3and SR ¼2parameters for 6DOFs.K.Kaltsoukalas et al./Robotics and Computer-Integrated Manufacturing 32(2015)65–7167Probability to get the best alternative configuration in DH, P(DH¼3,MNA¼20)¼20=27¼74%Consequently,for exhaustive search in DH(P¼1),MNA¼N¼27 Giving sample rate(SR)¼2for each alternative in the decision horizon,two samples are taken from the rest of the joints;thus, the number of complete alternative configurations becomesN completeðMNA¼27;SR¼2Þ¼MNA n SR¼27Â2¼54complete alternativesIn general,the number of complete alternative configurations for the predefined MNA and SR parameters is given by the following equation:Number of complete alternative configurationsðMNA;SRÞ;N complete¼MNA n SRð4ÞThe proposed algorithm does not have to search the entire work-space of the robot.During each iteration,only a maximum number of neighbor configurations are evaluated.Calculation time for a complete target path depends on the distance of the starting point to the target.Calculation time also increases when more inter-mediate points are requested for a smoother path that better fulfills the desired criteria.2.2.Evaluation of the alternative configurationsMultiple criteria are used for the evaluation of the alternative configurations.A decision matrix is built as shown in the following table.In the context of this study,two criteria have been taken into consideration,those of the distance due to translation and the distance due to rotation from the target position and the robot's orientation. Despite the fact that the proposed algorithm could also be used just for the definition of the joint parameters for a given position and orientation of the robot's end effector(inverse kinematics),the main purpose of this study is to plan the robot's path,which better fulfills the multiple criteria defined by the user.The search algorithm is easily extensible for more criteria.(Tables1and2)The utility for each of the alternatives is calculated as the weighted sum of the distance due to translation and to orientation. U i¼W t jj X iÀX jjþW r fðq i;qÞð5Þwhere X iÀX,is the Euclidean distance of the end effector from the target position and fðq i;q targetÞis the distance due to rotation (orientation of the target configuration).The weight factors W t and W r are selected from the user in order to give emphasis to the desired criterion.If the user is only interested in the position of the end effector,the factors W t¼1and W r¼0should be used.The metric of the distance between rotations is the Norm of the Difference of Quaternions,described in detail in[17].fðq i;q targetÞ¼min fjj q iÀq target jj;jj q iþq target jjgð6Þwhere,J J denotes the Euclidean norm(or2-norm)and q the orientation of the end effector,expressed in quaternions.The metric gives values in the range½0;ffiffiffi2p.The alternative configuration with the smaller utility function is selected at each decision point.Path search algorithmInput:Target position(X Y Z),target orientation(Euler angles Z–Y'–Z”),DH,MNA,SR,(k,dΘ:grid size&resolution) Output:Target configuration(θ1θ2θ3…θn)&the sequence of the intermediate configurations(path)1.The Grid parameters k&dΘare defined.2.The DH is defined.DH¼1/number of the robot's DOF.3.The Grid is constructed for DH.Alternatives are generated.4.The MNA is selected in order to enable a configuration near thetarget.5.The SR is defined.Random samples are taken from the jointsafter the DH.6.A decision matrix is built;MNA n SR complete alternatives areevaluated.The alternative configuration that provides the smaller value of the utility function is selected.7.The resolution and the size of the grid are redefined.8.Steps1–7are repeated until there is an alternative configura-tion that provides the target position and target orientation within the pre-defined distance error.2.3.Industrial manipulator motion generationThe proposed algorithm calculates the robot's sequential, intermediate configurations in order to approach the target posi-tion while fulfilling the predefined criteria for the path.Every configuration of the robot is within its joint limits.The robot controller uses the derived path in order to generate the motion of the industrial manipulator,taking into consideration the dynamic constraints of the robot.3.ImplementationThe proposed algorithm has been implemented in Matlab with the use of the Robotics Toolbox[18].Theflowchart of the algorithm is presented in the followingfigure.Fig.5.Industrial robot motion generation.Table1Evaluation of the alternatives according to the distance criteria.AlternativeConfigurationsNormalized criteria Utility valueDistance due to translation Distance dueto rotationU i¼W1C i1þW2C i2(where W1and W2the criteria weights)Alternative1C11C12U1 Alternative2C21C22U2 Alternative3C31C32U3…………Alternativem¼MNA n SR C m1C m2U mK.Kaltsoukalas et al./Robotics and Computer-Integrated Manufacturing32(2015)65–71684.ResultsIn Figs.7and 8,it is observed that the grid size and resolution parameters (k ,d θ)have a great in fluence on the smoothness of the path towards the desired position.Lower values of these parameters lead to better paths,however,the computational time is increased.4.1.Search algorithm parameters correlationIn order for the correlation among the search parameters MNA,DH and SR to be examined,a set of experiments was designed using the Taguchi method with the objective of process time minimization.The initial values of the grid parameters were selected to be k ¼5and d Θ¼0.1rad (E 61).4.1.1.Taguchi design of experimentsThe effect of the search parameters DH,MNA,and SR will be examined so as for the process time required for finding the path to be minimized to the target position.Four levels are selected for each parameter.The proposed set of experiments,according to the Taguchi method,is given in L'16table.L'16table:Fig.7.Grid resolution effect on the on the path (a)d θ¼0.01rad and (b)d θ¼0.1rad.Fig.6.Flowchart of the proposed algorithm.Table 2Set of experiments for 4levels of the parameters DH,MNA,and SR.Exp.no.DH MNA SR Time (Sec)122510.60225020.5732753 1.12421004 1.82532540.72635030.91737520.91831001 1.17942520.551045010.91114754 2.161241003 1.60135253 1.29145504 2.841557510.4816510022.01K.Kaltsoukalas et al./Robotics and Computer-Integrated Manufacturing 32(2015)65–71694.1.1.1.Analysis of means (ANOM)From Figs.9and 10,it is observed that the target position of theend effector is better approached for DH ¼3(first three degrees of freedom of the robot).The higher values of MNA and SR are suf ficient only when the orientation is taken into consideration.In order for both the target position and orientation of the end effector to be approached,the best results (lowest computing time)are given for DH ¼3,MNA ¼25and SR ¼2.The interaction among the parameters DH,MNA and SR and their effect on the computing time is presented in Fig.11.It is con firmed that for lower DH values suf ficient SR has to be consider whilst for higher DH values the SR value should be minimum for less computingtime.Fig.8.Grid size effect on the path (a)path generated for k ¼1and (b)path generated for k ¼5.Fig.9.DH,MNA and SR vs.processing time (targetposition).Fig.10.DH,MNA and SR vs.processing time (target position andorientation).Fig.11.Interaction of DH with SR (target position).K.Kaltsoukalas et al./Robotics and Computer-Integrated Manufacturing 32(2015)65–71705.ConclusionsIn this study,an intelligent search algorithm is proposed to define the path that leads to the desired position and orientation of the end effector of an industrial robot manipulator.The grid parameters as well as the search algorithm parameters DH,MNA, SR are proven to be drastically reducing the processing time.As regards the problem of approaching the target position,it is shown that the best results are obtained when thefirst three joints of the robot have been considered(DH¼3).This is consistent with the initial assumption that thefirst three degrees of the robot's freedom (joints)are responsible for the end effector's position.For the rest of the joints,only a few samples are sufficient in order for the path towards the target position to be determined.When the orientation of the end effector is considered,a higher sample rate for the joint angles,outside the decision horizon,should be used.The criteria considered for the calculation of the distance from the target position and orientation through weight factors,are predefined by the user.The path is sent to the robot controller,where the motion program of the industrial manipulator is generated.The algorithm is extensible to the use of more criteria in the future.Free collision paths will be addressed in a future study via a collision detection module integrated into the algorithm.AcknowledgmentsThis study has received funding by the project X-act/FoF-ICT-314355,funded by the European Commission under the7th Framework Program.References[1]Chryssolouris G.Manufacturing Systems–Theory and Practice.2nd ed..New York:Springer-Verlag;2006.[2]Mourtzis D,Alexopoulos K,Chryssolouris G.Flexibility consideration in thedesign of manufacturing systems:an industrial case study.CIRP J Manuf Sci Technol2012;5(4):276–83.[3]Karl F,Reinhart G,Zaeh MF.Strategic planning of reconfigurations on manufac-turing resources.Procedia CIRP[Internet].2012Jan[cited14.10.14];3:608–13.Available from:〈/retrieve/pii/S2212827112002764〉.[4]Tsianos KI,Sucan Ia,Kavraki LE.Sampling-based robot motion planning:towards realistic put Sci.Rev2007;1(1):2–11.[5]Kavraki LE,Svestka P,Latombe J-C,Overmars MH.Probabilistic roadmaps forpath planning in high-dimensional configuration spaces.IEEE Trans Robot Autom1996;12(4):566–80.[6]Bayazit B,Lien J,Amato NM.Probabilistic roadmap motion planning fordeformable objects*1introduction overview related work,no.May2002, p.26–33.[7]Amato N,Bayazit O.OBPRM:an obstacle-based PRM for3D workspaces.In:Proceedings of the International Workshop;1998.[8]Ji X.Planning motions compliant to complex contact states.Int J Robot Res2001;20(6):446–65.[9]Steven M Lavalle,Rapidly-exploring random trees a new tool for pathplanning;1998.[10]Kuffner JJ,Lavalle SM.RRT-Connect:an efficient approach to single-query pathplanning,no.April2000.p.995–1001.[11]D.Ferguson,N.Kalra,and A.Stentz,“Replanning with rrts.Robotics andAutomation,…,no.line3.Retrieved from:〈/xpls/ abs_all.jsp?arnumber=1641879〉;2006.[12]Xu F,Van Brussel H,Nuttin M,Moreas R.Concepts for dynamic obstacleavoidance and their extended application in underground navigation.Robot.Auton.Syst.[Internet].2003Jan;42(1):1–15.Available from:〈http://linkin /retrieve/pii/S0921889002003238〉.[13]Kohrt C,Stamp R,Pipe aG,Kiely J,Schiedermeier G.An online robot trajectoryplanning and programming support system for industrial use.Robot Comput-Integr Manuf2013;29(1):71–9./10.1016/j.rcim.2012.07.010. [14]Chong JWS,Ong SK,Nee aYC,Youcef-Youmi K.Robot programming usingaugmented reality:an interactive method for planning collision-free paths.Robot Comput-Integr Manuf2009;25(3):689–701./10.1016/ j.rcim.2008.05.002.[15]AYC.Robotics and Computer-Integrated ManufacturingInteractive robot trajectory planning and simulation using augmented reality.Robot Comput-Integr Manuf2012;28(2):227–37./10.1016/ j.rcim.2011.09.003.[16]Heng KH.Development of a configuration space motionplanner for robot in dynamic environment.Robot Comput-Integr Manuf 2009;25(1):13–31./10.1016/j.rcim.2007.04.004.[17]Huynh DQ.Metrics for3D rotations:comparison and analysis.J Math Imag Vis2009;35(2):155–64./10.1007/s10851-009-0161-2.[18]Corke PI.A robotics toolbox for MATLAB.IEEE Robot Autom Mag1996;3(1):24–32.K.Kaltsoukalas et al./Robotics and Computer-Integrated Manufacturing32(2015)65–7171。
作者关键词共现网络及实证研究
作者关键词共现网络及实证研究孙海生【摘要】以中国期刊网(CNKI)为数据源,构建作者—关键词共现网络,采用社会网络分析方法争Pathfinder networks算法,选取国内图书情报研究领域进行实证分析.研究结果表明:2-模网络可视化图能够直接揭示作者的主要研究领域,反映出作者学术兴趣的多样性,显示不同作者的相同研究领域,对学科领域结构的解读具有显性、客观的特点;节点中心度分析反映出作者和关键词在网络中位置的重要性.【期刊名称】《情报杂志》【年(卷),期】2012(031)009【总页数】5页(P63-67)【关键词】作者—关键词耦合;隶属网络;社会网络分析;Pathfinder networks算法【作者】孙海生【作者单位】聊城大学图书馆聊城 252059【正文语种】中文【中图分类】G3500 引言分析科学研究领域结构,研究学科领域的产生、发展和前沿,是近年来图书情报学研究的重要内容,采用的研究方法主要是以文献内容之间联系为基础的信息计量,比如以引文理论为基础的共引分析、耦合分析;以描述文献基本内容的关键词为基本单位的共词分析方法等[1],随着文本挖掘技术的逐渐成熟,必然会向以文献中知识元为基本单位的方向发展[2]。
当前,基于文献、作者的共引、耦合、共词分析构成了信息计量、科学计量领域炙手可热的领域识别、领域可视化的理论基础,颇具影响的Citespace就是以上理论结合计算机算法实现的可视化软件[3]。
作者、文献、期刊的共引、耦合分析以及共词分析都是针对同一文献特征共现的研究,随着研究的逐渐深入,针对两个或多个文献特征共现的研究也得到了发展。
Morris开发了基于Matlab的可视化系统DIVA(Database Information Visualization and Analysis System)[4-6],把一组被大量引用的文章定义为知识基础,另一组文献定义为研究前沿,利用DIVA系统显示研究前沿与期刊、研究前沿与时间、研究前沿与作者等的共现关系。
TetGen用户手册中文版
2 入门 ..............................................................................................................12
2.1 编译..........................................................................................................................12 2.1.1 Unix\Linux\MacOSX.....................................................................................13 2.1.2 Windows9.x/NT/2000/XP..............................................................................13 2.2 测试..........................................................................................................................14 2.3 可视化......................................................................................................................17 2.3.1 TetView..........................................................................................................17 2.3.2 Medit ..............................................................................................................17
stable diffusion 面试题目
stable diffusion 面试题目问题1:文本生成的几大预训练任务?GPT(Generative Pre-trained Transformer)系列:包括GPT、GPT-2、GPT-3等。
这些模型使用Transformer架构进行预训练,在大规模语料上学习语言模型,能够生成连贯、具有语义的文本。
BART(Bidirectional and Auto-Regressive Transformer):BART是一种基于Transformer的生成式预训练模型。
它通过自回归解码器实现文本生成,通过自编码器预训练目标来重构输入文本,能够生成流畅、连贯的文本。
T5(Text-to-Text Transfer Transformer):T5是一种通用的文本生成模型,使用了编码器-解码器结构。
它将不同的自然语言处理(NLP)任务转换为文本到文本的转换任务,可用于机器翻译、摘要生成、问题回答等多个NLP任务。
XLNet:XLNet是一种基于Transformer架构的预训练模型,采用了自回归和自编码器的组合方式进行训练。
它在语言建模任务上引入了全局的上下文信息,能够生成更加准确和连贯的文本。
UniLM(Unified Language Model):UniLM是一种多任务学习的预训练模型,将不同的自然语言处理任务转化为统一的生成式任务。
它可以用于文本摘要、问答系统、机器翻译等多个任务。
问题2:多模态中常见的SOTA模型有哪些?Vision Transformer (ViT): 将自注意力机制引入计算机视觉领域,通过将图像划分为图像补丁并应用Transformer模型,实现了在图像分类和目标检测等任务上的出色表现。
CLIP (Contrastive Language-Image Pretraining): 结合了图像和文本的对比学习,通过训练一个模型,使其能够根据图像和文本之间的相互关系进行推理,实现了图像与文本之间的联合理解和表示学习。
用于作物表型信息边缘计算采集的认知无线传感器网络分簇路由算法
况;(3) 基于频谱变化和通信服务质量 (QoS) 的自适应重新分簇:基于主用户行为变化引起的可用信道改
变,或分簇效果不佳对通信服务质量产生的干扰,触发 CRSN 进行自适应重新分簇。此外,本研究还提出了
一种新的能耗均衡策略去能量消耗中心化 (假设 sink 为中心),即在网关或簇头节点选取计算式中引入与节
2020 年 6 月 第 2 卷 第 2 期
智慧农业(中英文)Smart Agriculture
Jun. 2020 Vol. 2, No. 2
doi:10.12133/j.smartag.2020.2.2.201909-SA005
用于作物表型信息边缘计算采集的认知 无线传感器网络分簇路由算法
汪进鸿 1,2, 韩宇星 1,2*
(1. 华南农业大学电子工程学院,广东广州 510642;2. 岭南现代农业科学与技术广东省实验室,广东广州 510642)
摘 要:随着无线终端数量的快速增长和多媒体图像等高带宽传输业务需求的增加,农业物联网相关领域
可预见地会出现无线频谱资源紧缺问题。针对基于传统物联网的作物表型信息采集系统中存在由于节点密
1 引言
无线传感器网络 (Wireless Sensor Networks,
WSNs) 在以农情信息精确获取为前提的精准农 业中具有重要应用。将 WSNs 应用于需要高通量 数据传输的作物表型信息采集系统中,可以解决
收稿日期:2019-09-26 修订日期:2020-02-06 基金项目:广东省杰出青年科学基金 (2018B030306026) 作者简介:汪进鸿 (1995-),男,硕士,研究方向为农业信息化。E-mail:jhwangmc@。 * 通讯作者:韩宇星 (1983-),女,博士,教授,研究方向为复杂网络中的数据通信、图像视频处理。电话:020-85288202。 E-mail:yuxinghan@。
Zebra TC8000 应用指南说明书
TC8000 Application GuidePartner Application Platform Description VerticalsZebraProductProgramStatusNeed a simple PDF Viewer? This application will fit the bill. Justinvoke a download of a PDF file (either by web browser orcustom application)and this application will do the rest allowingNA BlueFletch Enterprise PDF Viewer Androidcustom application) and this application will do the rest, allowingdisplay of the PDF file. Password protected PDF? Not aproblem, PDF Viewer allows for entering needed documentpasswords. PDF Viewer includes text search and the ability tocopy text to the clipboard.Cross-IndustryMC40,TC70,TC75,TC8000ZebraEnterpriseValidatedGuide your field workers through their day with a constant flowof information between the field and core business systems.Cognito iQ provides field workers with an easy to use, intuitiveworkflow,available on any mobile ing decision-tree Energy and Utilitiesworkflow, available on any mobile device. Using decision treelogic to guide workers through tasks, the workflow adapts whendata is entered - that’s the intelligent bit.Standard APICompatible With3rd Party SoftwareEnergy and UtilitiesGovernment ServicesHealthcareHospitalityManufacturingNational ResourcesZebra EMEA Cognito IQ Cognito iQ Mobile (SmartWorker)AndroidCompatible With 3rd Party SoftwareCross-Platform CapabilityDevice AgnosticNational ResourcesPublic SafetyTransportation and Logistics TC8000EnterpriseValidatedExpress Client is a graphical-based client application that workswith the MWA server for Oracle WMS and MSCA. Compared toit h t b d t l t li t GUI li t idTC8000MC9200NA Intellinum Inc. Express Client Androidits character-based telnet client, GUI client provides userinterface that is more attractive and user friendly. Furthermore,users will have quicker access to LOV and action buttons withthe use of touch screen capability.Manufacturing, Retail,Transportation and Logistics,Wholesale DistributionMC9200TC75MC67TC55ZebraEnterpriseValidatedUSignIn is an application designed to utilize the barcodescanner to scan eDoc quickly for signing. PRIVACY ANDSECURITY What really separates USignIn from the rest is that messages are encrypted with our Dynamic PKI encryptionalgorithm. Compliment that with our Biometric Signature Education g p gverification algorithm, only intended recipients can open and read encrypted messages. With email and attachment permissions, you control how your recipient read and download attachments. BIOMETRIC SIGNATURE SIGN IN You can quickly and securely sign into your account by using your finger Government Healthcare Hospitality Human ServicesiSign International quickly and securely sign into your account by using your fingerto sign your signature on the screen. Our short-loop biometricsignature verification system learns your signature over time;the more you sign in, the easier it is for iSign to learn yoursignature. Enrolling your signature takes less than 1 minute andonly requires4signaturesManufacturingPublic SafetyRetailTransportation & LogisticsUtilitiesWholesale DistributionTC70TC75ZebraEnterpriseNA iSign International USignIn Android only requires 4 signatures. Wholesale Distribution TC8000ValidatedG S The MSB App allows you to run mobile applications which havebeen created in the SAP ERP system using the MobisysSolution Builder add-on with the help of the Mobisys ScreenfManufacturing, TransportationMC9200TC55TC70TC75CZebraEnterpriseV lid t dEMEA Mobisys GmbH MSB App Android Designer and by means of ABAP programming.and Logistics, Utilities TC8000ValidatedSkillWeb SmartTask POD A simple app for electronic proof of delivery, producing a PDFfile with the signature of the person receiving the parcel and aweb based interface for retrieval of the data.Transportation and LogisticsTC8000TC55TC75ZebraEnterpriseValidatedEMEA Android p gTransform your mobile device into a powerful integrated tool for managing inventory. A free add-on for Zenventory users!NOTE: To use this free add-on application, you must first have an active Zenventory account set up for the warehouse you want to MC40,MC67,TC55,TC70,TC75ZebraEnterpriseEMEA Ubiquia Inc Zenventory Android active Zenventory account set up for the warehouse you want tomanage.ManufacturingTC75,TC8000EnterpriseValidatedStayLinked Enterprise Terminal StayLinked Enterprise Terminal Emulation (TE) is the only TEsolution designed for wireless environments. StayLinked'sunique architecture reliably and securely connects virtually any Hospitality, Retail, WholesaleZebraEnterpriseV lid dNA StayLinked Corp Emulation Android mobile to mission-critical, server-based applications Distribution TC8000ValidatedDCIxWMS (Warehouse Management System) is a modern on-line solution for complex management of logistics processes inwarehouses, distribution centres and manufacturing companies.Using the advanced DCIxWMS system, record keeping, TC8000EMEA Aimtec DCIxWMS Android management, supervision and control of the warehouse operations, states and inventory movements are simplified, place usage and personnel productivity are improved.Manufacturing, Retail, Transportation and LogisticsMC3200MC9200SISLOG Suite is the result of Atos’ extensive experience in thedesign development and implementation of advanced logisticsdesign, development and implementation of advanced logistics solutions. The suite covers the entire supply chain process fromproduction to warehouse management and distribution. SISLOGadapts to the conditions and needs of virtually every businesssector. It seamlessly integrates with management systems,including ERP and proprietary systems This efficient exibleEMEA Atos Spain S.A.SISLOG Android including ERP and proprietary systems. This efficient, flexible and innovative solution is designed to meet the operational and management needs of the most modern storage and distribution centers.Healthcare, Manufacturing,Retail, Transportation andLogistics, Utilities TC8000EMEA Axes Software Excel App Android Excel App is an application for warehouses.Manufacturing TC8000EMEA Axes Software xTrackWMS Android xTrackWMS is an application for warehouses.Manufacturing TC8000EMEA Axes Software xTrackFO Android Android application for warehouses management.Warehousing TC8000This application is a Proof of Fulfillment application formanufacturers to use when shipping. It allows the user to scan aPO/Invoice and take several pictures of a product before it isNA Barcoding Inc CaptureSoft POF Android PO/Invoice and take several pictures of a product before it is shipped. The collected images are then uploaded to an FTPserver (assumed to be tied to a website) where the customercan view the state of the products as they were shipped.Manufacturing TC8000EMEA Cleverence Soft Mobile SMARTS Android Mobile Business Application platform for creating and executingcustom and out-of-box business solutions. Platform supports alot of PDA's.Retail, Warehousing TC8000 HuB is an application system that supports the collaborativepp y ppshelf replenishment process. The application aims toautomatize sales floor operations on retail, optimizing the usageof resources, the information flow, and reducing the shelfrupture level, in order to maximize sales and improvecustomer’s experience, taking advantage of mobile features.customer s experience, taking advantage of mobile features.HuB controls goods receiving process, the allocation ofproducts in the backroom area, shelf replenishment, goodstransference to the sales floor and its allocation, and productmovements inside the store. It also controls products quantityand stock level using specific algorithms to generateLACR GIC HuB Android and stock level, using specific algorithms to generatereplenishment tasks. At sales floor, shelf addresses areidentified (barcodes). For each one of these addresses,products (one or more) are linked/binded and the replenishmentinformation generated and controlled by HuB.Retail TC8000EMEA Hardis Group Reflex Web Android Based on web technology, Hardis use their own protocol(different from HTML5) for classical Warehouse activities. Retail, Manufacturing TC8000Warehousing ManufacturingEMEA Keep IT Mobile KIM Warehouse Android The solution is designed for logistics companies and provides aclear picture of the entire flow of goods in a warehouse.Warehousing, Manufacturing,Retail, Transportation andLogistics TC8000 Lucas Move, featuring Jennifer, is the core component of ourvoice picking and Mobile Work Execution solutions. Lucas Movestreamlines hands-on processes for warehouse associates whowear headsets and a mobile computer, leaving their eyes andhands-free to focus on their work. DCs can choose to use Movewith rugged smartphones or a range of other voice-capablemobile computers, avoiding the costs of proprietary hardware,NA Lucas Systems, Inc.Lucas Move Androidp,g p p y,and getting all the benefits of using new smart devices andwearables.Manufacturing, Retail,Transportation & Logistics TC8000The Mobisys MSB (Mobisys Solution Builder) App is a hybridApp which can be connected to any SAP System where theMSB Add-On is installed on. With this App, you can carry outmobile applications for SAP business processes that weredefined in the SAP system with the MSB. Using the MSB App y g ppon the mobile device and MSB Runtime in the SAP system, youcan run mobile applications that were created with ABAPdirectly and without any middleware; this is based on SAPstandard technology (Internet Communication Framework, WebDispatcher)and runs via telecommunication or a networkEMEA Mobisys GmbH MSB App Android Dispatcher) and runs via telecommunication or a network connection.Retail, Transportation &Logistics TC8000Control of distribution of pallets / packages by managing loadshipments in the distribution center, and unloading at the finaldestination ensuring the traceability of packages or pallets theEMEA Mostoles Industrial Shipment Tracking Android destination, ensuring the traceability of packages or pallets, the work done and the duration of the same throughout thedistribution process.Warehousing TC8000The app comes with 4 default scenarios, use as is or configure pp geasily for individual needs. Inventory is the most common datacapture scenario needed. Localize it with you own language orheadlines, add og modify lines or menus. Use for simplewarehouse actions as Move, Receive or register items going outof the stock. Use for field service applications, repair Works etc. MC40EMEA Norris Print-Tech MotoScan Android of the stock. Use for field service applications, repair Works etc. Supports Integrated scanners in Zebra Android devices. One time license fee, supports database lookup functions. All without any programming or logic algorithms.Utilities, Manufacturing, Retail, Field mobility MC40TC55TC70/75TC8000Abakus Warehouse solution provides WMS services and similarfunctionalities Receiving put away transfers stock takingEMEA Optiscan OY Abakus Warehouse Android functionalities. Receiving, put-away, transfers, stock-taking, picking and loading are all performed with the technologies bestsuited for the purpose.Transportation & Logistics TC8000VMS allows you to design your own form and collect any kind ofdata in any scenario. You can collect data such as text, number,LACR Proxion Solutions VMS Android images and signatures using the device's hardware whenavailable.Cross-Industry TC8000Put an end to the "blind order" aspect of your current remote order entry system by providing much needed information to your mobile workers with Quest Solution's Order Entry product. It allows two-way communication with your field personnel - as sales orders are sent in, customer and pricing information isNA Quest Solution Quest Solution Order Entry Android updated on the handheld device. Eliminate the time-consumingand error-prone process of faxing or phoning in orders withlegacy equipment.Human Services,Transportation & LogisticsTC8000,WT6000EMEA Zetes Burótica PreAutoSales Android Auto Sales TC8000An Easy Way to Configure Your Printers. The faster you getnew equipment up and running, the more quickly you canachie e o r ret rn on in estment With Zebra’s Android Printerachieve your return on investment. With Zebra’s Android PrinterSetup Utility, configuring your Link-OS printers to optimizeperformance is easy – no specialized knowledge required. Justdownload Zebra’s Printer Setup Utility app on your Androidmobile device and tap the printer you wish to configure. Youri d d i ill i l b i i i iprinter and device will instantly begin communicating viaBluetooth. Then follow the simple setup wizard that walks youthrough how to set specific printing parameters – such as calibration, media type, ribbon, printer language and security – to optimize performance. Bluetooth Printers Now Manageable – MC40, TC55, TC70,NA Zebra Technologies Printer Setup Android Even in the Field Traditionally, Bluetooth printers are not easilymanaged – particularly when the printers are used in the field bya mobile workforce.UtilitiesTC75,MC18,TC8000 The TC8000 Demo is specifically designed to help device usersexperience the differentiating capabilities of the device The appexperience the differentiating capabilities of the device. The appis intended to run on the TC8000. In order to properly use anddemo the SimulScan and Augmented Reality features, pleaseprint off the PDFs found here:SimulScan:https://zebra box com/s/xiz55aibecidoon6kffkgzil9c3nap3sNA Zebra Technologies TC8000 Demo App Android https:///s/xiz55aibecidoon6kffkgzil9c3nap3sAugmented Reality:https:///s/jgnrb27y16hqo4ikbtf0627oih03l85w Utilities TC8000。
荒漠场景应用的车联网及其分簇路由算法
o r a vehe d.
Ke y wor : AN ET; use n ds V cl tr g;r utn i o ig
1 引言
随着 经 济 的发展 和汽车 的普 及 ,车辆 自组 织 网
络 ( ANE , e iua o ew r s V T v hc l a h c t ok )已成 为人们 rd n
De eo me tPo r m fChn 8 3P o r )(0 8 v lp n r ga o ia(6 r ga m 2 0 AA0 Z2 5 ; e S e i ie v lp n o n ainf rteAc iv me t 1 0 ) Th p ca z d De eo me t u d t he e n l F o o h Tr so aino Ja g uP o ic BA2 1 0 3 ; r ga r w nu c l n ae t iesyo hn NCE -00 1 ) n a f r t f i s rvn e( m o n 0 0 2 ) Po r f m o Ne Ce tr Ex el t l ns nUnv ri f ia( y e T i t C T 1 — 0 8
Ve c l ra cne wo k nd cus e i o i hi u a d ho t r a l t rng r utng
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
UbiRoad: Semantic Middleware for Cooperative Traffic Systems and ServicesVagan TerziyanMIT Department, University of Jyvaskyla P.O. Box 35 (Agora), 40014Jyvaskyla, Finlande-mail: vagan@jyu.fi Olena Kaykova, Dmytro Zhovtobryukh Agora Center, University of Jyvaskyla P.O. Box 35 (Agora), 40014Jyvaskyla, Finlande-mail: olena@cc.jyu.fi, dzhovto@cc.jyu.fiAbstract—Emerging traffic management systems and smart road environments are currently equipped with all necessary facilities to enable seamless mobile service provisioning to the users. However, advanced sensors and network architectures deployed within the traffic environment are insufficient to make mobile service provisioning autonomous and proactive, thus minimizing drivers’ distraction during their presence in the environment. An ideal system should provide solutions to the following two interoperability problems: interoperability between the in-car and roadside devices produced and programmed by different vendors and/or providers, and the need for seamless and flexible collaboration (including discovery, coordination, conflict resolution and negotiation) amongst the smart road devices and services. To tackle these problems, in this paper we propose UbiRoad middleware intending utilization of semantic languages and semantic technologies for declarative specification of devices’ and services’ behavior, application of software agents as engines executing those specifications, and establishment of common ontologies to facilitate and govern seamless interoperation of devices, services, remote systems and humans.Keywords- context-aware services; cooperative traffic; smart road; middleware; semantic technologies; agentsI.I NTRODUCTIONThere is about half of a billion drivers only in Europe, who wish driving to be more comfortable, efficient, ecological and less risky. Not far are the times when cars will themselves prevent accidents. People spend more time in vehicles and they are expecting also more possibilities to work and use various services while traveling, which requires new travel infrastructure and automation services [1]. These should combine various vehicles, their drivers and passengers, smart roads and appropriate Web services [2]. Recent wireless and internet technologies enable completely new possibilities to integrate available efforts into the new advanced traffic paradigm – cooperative traffic [3].Service-oriented architectures related to traffic management, smart roads and future context-aware services for drivers are closely integrated into the Internet of Things [4], which is a world where things can automatically communicate to computers and each other, providing services for human benefits. In such “Future Internet”, intelligence and knowledge will be distributed among an extremely large number of heterogeneous entities: sensors, actuators, devices, cars, road infrastructures, software applications, Web services, humans, and others. To realize this vision, there is a need for an open architecture, which will offer seamless connectivity and interworking between these heterogeneous entities. Moreover, ensuring collaboration, synchronization but also control of this distributed intelligence is a challenge that needs to be addressed, or the Internet of Things will become a chaotic, un-controlled and possibly dangerous environment since some actors of this Internet have impact on the real world (e.g., software or humans through actuators). Cooperative traffic domain enables interoperability between a large number of heterogeneous entities, while ensuring predictability and safety of their operation, is difficult without an extra layer of intelligence that will ensure the orchestration of these various actors according to well-defined goals, taking into account changing constraints, business objectives or regulations. This paper introduces such a middleware layer (UbiRoad). It provides cross-layer communication services (data-level interoperability) to the entities and extended multi-agent technologies will provide collaboration-support services (functional protocol-level interoperability and coordination) for these entities. The UbiRoad middleware concept apparently entails a vision of a multifaceted, multi-purpose and multipronged middleware platform applying multidisciplinary approach to extension and enhancement of the future smart traffic environments UbiRoad middleware should be rather seen as a meta-structure on top of the future intelligent transportation systems and services and as intelligent stratum between the smart road device layer and the future service oriented architectures.A first major problem to be addressed by UbiRoad is inherent heterogeneity, with respect to the nature of components, standards, data formats, protocols, etc., which creates significant obstacles for interoperability among the components of ubiquitous computing systems. This heterogeneity is likely to induce some integration costs that will become prohibitive at a very large scale preventing a rich ecosystem of applications to emerge. It is generally recognized that achieving the interoperability by imposing some rigid standards and making everyone comply could not be a case in open ubiquitous environments. Therefore, the interoperability requires existence of some middleware to act as the glue joining heterogeneous components together.The second major issue is to guarantee high level of safety. Since the IT infrastructure and through them users are going to have real actions in the real physical world throughvarious actuators we have to ensure that these actions are properly controlled and coordinated. Despite the wish to enable as many actors as possible to have access to physical world objects around the world to enable a large set of diverse applications, this should be done in a well-understood and safe manner. The “things” will have to exhibit some required behaviors that humans have adopted to assemble in cooperative traffic social interactions.The UbiRoad approach can be seen as studying the triangle of device-software-human interaction seen from the perspective of the above described scenarios. Henceforth we refer to “device” as to any monitored or controlled physical objects including e.g., vehicles. Substantial research results related to edges and vertices of this triangle have been (recently) reported [5, 6, 7] (e.g., efforts related to middleware for embedded systems, efforts related to integration of diverse software systems and services, etc). What is missing is an integrated coherent approach to cover the whole triangle. Moreover, many on the past research initiatives do not truly deal with the core topic, which is interoperability versus just interconnectivity. The components of cooperative traffic systems should be able not only to communicate and exchange data, but also to flexibly coordinate with each other, discover and use each other, learn about the location, status and capabilities of each other, and jointly engage in different traffic situations. Moreover, the components must achieve the above using an always-on, safe, robust and scalable means of interaction.Further in this paper, we argue in favor of fully interoperable (though heterogeneous), highly dynamic and extensible smart road environments. We present a specialized agent-driven middleware platform UbiRoad, in which each ubiquitous smart device (as well as each individual service exposed as an individually accessible entity through the environment) will be assigned a representative agent within UbiRoad. The resulting multi-agent system will be exploited as a mediation facility enabling rich cooperation capabilities (e.g., discovery, coordination, adaptability, and negotiation) amongst the devices inhabiting the smart traffic environment. Utilization of semantic technologies [8] in UbiRoad will ensure efficient and autonomous coordination among UbiRoad agents and will thus ensure interoperability between associated devices and services. Several UbiRoad ontologies are an important asset contributing to interoperability realization within future smart traffic environments. These ontologies are used not only for the benefit of UbiRoad middleware architecture, but also and most importantly for facilitation of interoperability and integration of existing and brand-new future devices, services and methodologies. Through appropriate declarative specification of smart road components’ behavior and using sophisticated choreographic control agents in a multimodal dynamic networked environment, the UbiRoad enables various devices and services to automatically discover each other and to configure complex services functionally composed of the individual services’ and devices’ functionalities.The rest of the paper is organized as follows: in ChapterII we are providing the motivating scenario for the new challenging requirements to traffic management systems; in Chapter III we list the requirements and related challenges to be addressed when designing such systems; in Chapter IV we provide possible solution for the challenges based on the concept and architecture of the so called Global Understanding Environment; in Chapter V we discuss some important and challenging features of appropriate agent-driven platform (UBIWARE) suitable for UbiRoad implementation, such as: semantic adapters and integrators (called ontonuts); semantic visualization technology (called for-eye); user-driven system configuration (via so called smart comments); and semantic blogging; in Chapter VI we briefly discuss on Traffic and Mobility ontology and semantic integration of heterogeneous traffic management systems; and we conclude in Chapter VII.II.M OTIVATING S CENARIOConsider the following story, in which we try to integrate several possible scenarios of future use for the UbiRoad middleware.(Beginning of the story) “Timo lives in Jyväskylä. Former researcher, he is a widely recognized expert in the field of intelligent software agents. Nowadays Timo owns a small IT business based in Jyväskylä, and his firm is often subcontracted by large IT and telecom enterprises to perform highly specialized development services. Therefore, Timo is a frequent guest in Helsinki and Helsinki region, where most of his company’s employers reside. Despite considerable distance between Jyväskylä and Helsinki, Timo likes neither airplanes, nor trains, and always travels inside Finland by car. Fortunately, he is a big cars-lover and a good driver.Timo arrived in Helsinki early in the morning and spent the whole day participating in a few various business meetings and research seminars. Now, when he is about to leave Helsinki, he feels very tired. He could stay in Helsinki overnight, but he has another important meeting scheduled for tomorrow at 7 am in Jyväskylä. Not to fall asleep on the way back to Jyväskylä, Timo drops by the nearest cafeteria and drinks a cup of strong coffee. Having felt a burst of energy after the sprightly drink, he gets into his car and leaves Helsinki at dusk. In the car Timo selects from his audio collection some nice invigorative music to listen to and sets the car control system’s operating mode to ‘exhaustion’ using the available on-board control panel. Timo knows that in this mode the awareness levels of a multitude of software agents, which inhabit his car and make it a part of the UbiRoad intelligent transportation system, reach the highest possible value. Now he feels much less vulnerable because of fatigue, as agents in this mode help significantly reduce exposure to various on-road risks. The in-car control system adjusts climate conditions (temperature, humidity, level of oxygen) to optimal levels with respect to the selected operating mode: it aims to maintain cool, fresh, oxygen-rich atmosphere inside the car in order to prevent the driver from falling asleep; and activates on-board alarm system, which is configured to give to the driver light and audio indication every 30 seconds (not allowing him falling asleep). Thecorresponding UbiRoad traffic agent (representing Timo and his car as a dynamic road user entity) sets own hazard level to ‘red’, thus notifying other road users of potential risks associated with its road user. When Timo drives onto the motorway going out of Helsinki, he feels much more comfortable and relaxed, as he is sure that all necessary measures of passive risk prevention have been undertaken and as he should no longer pay attention to the oncoming traffic (on motorways directions of traffic are separated).To shake himself up a bit, Timo switches to the left lane (each direction of the motorway connecting Helsinki and Lahti has two lanes) and starts overtaking all cars, which slowly go on the right lane. The speed limit on this motorway is 120 kmph and driving at it can be refreshing. After some time of such racing Timo however forgets about the speed, which immediately goes beyond 130 kmph, and the traffic agent monitoring velocity and controlling speed regimes detects inadmissibly excessive speed (via comparing actually measured vehicle’s velocity with the speed limit that the agent can read from RFID-enhanced traffic signs located on the sides of the road) and activates a loud beep tone combined with an appropriately marked blinking red LED on the control panel. Timo takes this as a timely signal to calm down, decelerates to the allowed speed limit and uses the cruise control functionality embedded into the steering wheel to fix the speed at the current level. Now he can release the accelerator completely and give his leg some rest.Timo utilizes voice control system to engage a travel estimator service and thus to find out the approximate time of his arrival in Jyväskylä. The specialized voice recognition system reads Timo’s oral instructions, interprets them and finally transforms them into the format recognizable by UbiRoad agents. Then the corresponding communication agent finds an appropriate travel estimator service in the Internet, negotiates service contract with the agent representing the service and finally invokes the service. The result of travel duration estimation, 2 hours and 10 minutes, appears on the LCD screen built in the control panel to the right of the driver’s seat. Timo decides to call home and let his wife know he is coming back soon. Timo’s mobile phone is already connected with the in-car control system via Bluetooth. Timo utilizes voice control to access his phone and then voice dial to call Anna. While the picked number is being dialed, playing music is automatically damped down, and as soon as the phone connection is established, the conversation is output through the in-car embedded speaker system. After several minutes of chatting with Anna, Timo notices that he is driving already in the neighborhood of Lahti. Here 3G telecommunication network is available. The communication agent immediately detects this and using the LCD screen asks Timo if he is willing to switch to a video call. Timo accepts the offer by pressing the corresponding button on the touch-sensitive screen. The communication agent immediately requests the video capture service from a tiny camera embedded in the control panel in front of the driver’s seat. Then it rearranges the current voice call session as a new video call session without interrupting the call and interweaves the audio component acquired through Timo’s hands-free microphone with the video component obtained by the in-car embedded video camera. A live view of Anna appears on the LCD screen of the control panel. However, as shifting driver’s focus to this side screen is inconvenient and distracting the driver from actual driving, the picture on the screen is instantly projected on the internal surface of the car’s windscreen just in front of the driver’s seat. The projected image is however semi-transparent not to impede driver’s clear view of the road.Timo finishes talking with his wife when Lahti is already left behind. He notices that twilight almost gave the place to solid night, but the motorway is still well illuminated. Timo decides to make a short stop at the picturesque roadside restaurant “Tähtihovi” in order to stretch his legs and have another cup of coffee before proceeding to the most difficult and boring part of his trip. Soon after this stop Timo should drive off the motorway to the side route leading to Jyväskylä. The traffic agent recognizes this major route change and reminds Timo of it well in advance using available visual indication means (LCD screen, projection on the windscreen, etc.) As Timo turns to the needed side road, he soon finds himself completely benighted as roadside lamps are uncommon here. He switches to upper beam to see at least something. Using embedded luminosity sensors, the agent monitoring external physical environment immediately detects severe lack of light on the road and activates built-in night vision system that multiply amplifies luminosity of the reflected light both in visible and infrared spectrum, thus being able to identify distant objects also by the heat they emit (e.g., oncoming cars, cyclists, pedestrians, elks, etc.). Such enhanced view of the road environment is projected on the internal surface of the car’s windscreen so that it maximally coincides with the driver’s field of view. Hence, Timo is now able to see everything much more clearly and recognize moving objects well in advance. What is more, in observed conditions of dark driving on a narrow bidirectional road the traffic agent starts to provide necessary assistance services such as improved navigation and automated signaling, e.g., a dynamically changing light-modulated traffic map of the neighborhood (specifically highlighting the route undertaken) is projected on the right side of the windscreen; upcoming turns and bends of the road are visually indicated (e.g., in the form of light arrows in the upper part of the windscreen); crossroads and cars approaching from the opposite direction are also identified for the driver in good time; switching from upper to lower beam (in proximity of oncoming cars) and back is performed automatically.Luckily, the road is almost empty at night, and Timo almost reaches Jyväskylä when he catches up a heavy truck slowly going ahead of his car. Road is constantly dodging and the road-bed is narrow to comfortably overtake the truck. Timo almost loses patience waiting for a more or less straight section of the road, and as soon as such sectionappears ahead, he confidently sends the car on the opposite lane and starts overtaking the truck. Suddenly he sees an opportune notification of an oncoming vehicle, which is still on the other side of the hill ahead of Timo and is thus unseen, but is quickly approaching. Perhaps, Timo is too tired as he makes an estimation error: he decides that he has enough space and time to complete the maneuver and continues overtaking. The oncoming car is however approaching too fast making head-on meeting with Timo’s car almost inevitable. Moreover, the truck being overtaken turns out to be a long road-train, and it is already too late to get back behind it because Timo’s car has passed more than a half of the truck’s length already, when Timo realizes that he fell a victim to his own fatigue and impatience, and that only a miracle can now save him from head-on collision with the other car. UbiRoad intelligence is such a miracle.The UbiRoad traffic agent that resides in Timo’s car establishes communication with the approaching car’s traffic agent immediately after it recognizes the presence of another vehicle in the proximity. At the same time it maintains communication with the traffic agent of the truck. The agents jointly monitor the process of rapprochement of the (three) vehicles. When Timo starts his overtaking maneuver, the traffic agents realize the situation is no longer standard. They integrate their individual traffic information, jointly reason upon it in the dynamic traffic context, and deduce that the collision is unavoidable. To prevent the traffic accident or any other dire consequences of Timo’s mistake, the agents must undertake active measures of risk mitigation. The traffic agents of the approaching car and the truck notify their drivers of the potentially critical hazardous traffic situation and forcibly decelerate their vehicles to buy Timo enough time for successful completion of the overtaking maneuver. For its part, Timo’s traffic agent aggressively visualizes the imperative “complete the maneuver”, thus granting some extra confidence to its driver, who is already close to panic. Given such clear instruction, Timo accelerates even more and safely completes the overtaking maneuver. In twenty minutes, when he, exhausted as a squeezed lemon, but happy to escape probably fatal traffic accident, parks his car in his parking slot, another in-car agent reads Timo’s schedule for tomorrow (stored in the organizer application within Timo’s mobile phone) and sets engine warming-up timer to 6.30 am …” (end of story).To be able to make this scenario a reality we have to face several challenges described in the next chapter.III.U BI R OAD M IDDLEWARE C HALLENGESA.InteroperabilityBy proclaiming interoperability as its major ultimate objective, UbiRoad approach deals with three major types of interoperability problem: technical interoperability (being the capability of devices, protocols and other technical standards to co-exist and interoperate), semantic interoperability (being the capability of various system components to treat and interpret exchanged data and information identically and share a common understanding of it), and pragmatic interoperability (being the capability of system components to capture willingness of partners to collaborate or, more generally, to capture their (and even human users’) intent). Technical interoperability will be achieved through the agent-based mediation between different devices and standards with the aid of special adapter components and tunneling mechanisms. Semantic interoperability is the main focus of the UbiRoad approach as it is a prerequisite for seamless information internetworking and integration, and for smooth autonomous communication between various resources within a smart traffic environment. Semantic interoperability can be achieved by exploitation of rich metadata describing informational objects and semantic resource descriptions written in compliance with well-established semantic standards and on the base of predefined domain ontologies and UbiRoad Ontologies. Pragmatic interoperability amongst smart space components is achieved through appropriate design of declarative specifications of such components’ behavior and on-the-fly agent-based identification of this behavior using given descriptions. Finally, the most innovative type of interoperability, which UbiRoad provides, is the so-called ‘cross-layer’ interoperability, e.g., interoperability between devices and services in a smart traffic environment. This particular class of interoperability problems is often difficult to solve even on individual basis. However, UbiRoad provides native support for cross-layer interoperation by implementing the paradigm of resource-oriented networking. This paradigm enforces unified treatment of various system components, e.g., devices, services, applications and even users, as different types of resources (Figure 1).Figure 1. Agent-driven smart road interoperabilityThe communication is then established between resources regardless their particular type provided that negotiation is performed by resources’ representing agents (associated with resources within smart traffic environmentsand beyond) as shown in Figure 1 and appropriate Semantic Web standards for unified resource description are used.B.Flexible CoordinationAs smart traffic environments are basically deployed to provide users with dynamically configured, customized, value-added and on-the-move autonomously operating services, UbiRoad targets establishment of such service creation and provisioning framework that would emphasize the above mentioned characteristics of ubiquitous services. Customization, personalization, added value, dynamicity and autonomy of services is to be achieved through construction and utilization of context-aware, adaptable and reconfigurable composite service networks. Service networks can be composed using declarative specifications of service models. Reconfigurability of service networks is made possible via utilization of hierarchical modeling of service control and its run-time execution. Dynamic adaptation of services is performed by special context-aware control components built in service networks. The traditional tradeoff “customization vs. autonomy” can be dealt with through a balanced use of user-aware goal-driven on-demand service composition, AI-enriched active context-awareness capturing user intent, and user-collaborative passive context-aware service composition. Though it is a challenging task, utilization of agent-based approach for service composition makes it much more flexible compared to traditional orchestration approaches. This difference in flexibility can be seen from the definition of the traditional Semantic Web services (SWS) given in [17] (“Self-contained, self-described, semantically marked-up software resources that can be published, discovered, composed and executed across the Web in a task-driven way”) and the definition of proactive (agent-driven) SWS given in [18] (“Self-contained, self-described, semantically marked-up proactive software resources that can be published, discovered, composed and executed across the Web in a task-driven way, and which behave to increase their utility and are the subject of negotiation and trade”). Agents can bring many valuable features into a service composition framework, e.g., precomposition, distributed hierarchical control of service networks (not requiring a dedicated underlying infrastructure), and enhanced negotiation of non-functional service parameters.C.Self-ManagementUbiRoad brings self-management aboard via presenting totally distributed agent-driven proactive management system. UbiRoad agents monitor various components, resources and properties within the system architecture and infrastructures belonging or otherwise interacting with the managed smart road environment, and react to changes occurred by reconfiguring the architecture in appropriate way with respect to the predefined (or inferred) configuration plan. Configuration plans basically represent enhanced business models, which are adhered to during accomplishment of communication procedures between different parties. Due to purely distributed layout of the agent system and outstanding agents’ programmability, merely all kinds of business models can be formalized and enacted by the UbiRoad management platform (due to richness of the utilized agent communication language and of the associated ontology base). In addition to this, UbiRoad agents are capable of learning via utilizing available data mining algorithms and further dynamically reconfiguring the managed architecture on the basis of acquired knowledge, thus being capable of inferring (also collaboratively) new configuration plans. UbiRoad can be deployed on top of any architectural model (including ad-hoc and peer-to-peer, which is of crucial importance for highly dynamic traffic environments) due to benefits of agent technologies and open resource interfaces. Also, the UbiRoad platform can make use of contextual information extracted from the managed networking environment in order to act as appropriately to the observed requirements and circumstances as possible.D.Trust and ReputationTrust is identified as one of the major and most crucial challenges of the future computing and communications. We envisage a semantic ontology-based approach to building a universal trust management system. To make trust descriptions interpretable and processable by autonomous trust management procedures and modules, trust data should be given explicit meaning via semantic annotation. Semantic trust concepts and properties will be utilized and interpreted using common trust ontologies. This approach to trust modeling is especially flexible because it allows for various trust models to be utilized throughout the system seamlesslyat the same time. Trust information can be incorporated as part of semantic resource descriptions and stored in dedicated places within the UbiRoad platform. Communication and retrieval of trust information will be accomplished through corresponding agent-to-agent communication. Agents representing communicating resources must be configured appropriately to handle all necessary trust management activities between the corresponding communication parties. Trust management procedures can be realized as a set of specific business scenarios in the form of agent configuration plans.E.Other ChallengesSpecifically, due to utilization of extended intelligent agent technology UbiRoad significantly contributes to realization or enhancement of the following important characteristics and functionalities of collaborative traffic environments:•Data mining and knowledge discovery (e.g., utilization of accumulated statistics of traffic accidents), whichmay be organized either by establishing centralizedWeb server with appropriate data processing services orby local processing of the analytics and exchanging ofit in a P2P manner;•Learning (e.g., case-based learning, when traffic agents can learn on sets of predefined examples of trafficsituations);。